Cross-site request forgery (CSRF) vulnerability in the admin terminal in Hawt.io allows remote attackers to hijack the authentication of arbitrary users for requests that run commands on the Karaf server, as demonstrated by running "shutdown -f."
References
Link | Resource |
---|---|
https://infocon.org/cons/SyScan/SyScan%202015%20Singapore/SyScan%202015%20Singapore%20presentations/SyScan15%20David%20Jorm%20-%20Finding%20and%20exploiting%20novel%20flaws%20in%20Java%20software.pdf | Issue Tracking Third Party Advisory |
https://github.com/hawtio/hawtio/commit/b4e23e002639c274a2f687ada980118512f06113 | Issue Tracking Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1072681 | Issue Tracking Patch Third Party Advisory |
Information
Published : 2017-12-29 14:29
Updated : 2018-01-11 05:46
NVD link : CVE-2014-0120
Mitre link : CVE-2014-0120
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
hawt
- hawtio
redhat
- jboss_fuse