Multiple cross-site request forgery (CSRF) vulnerabilities in WS-Proxy in Eye-Fi 1.1.2 allow remote attackers to hijack the authentication of users for requests that modify configuration via a SOAPAction parameter of (1) urn:SetOptions for autostart, (2) urn:SetDesktopSync for file upload, or (3) urn:SetFolderConfig for file download location or modification of authentication credentials; and (4) urn:AddNetwork for adding an arbitrary Service Set Identifier (SSID) to hijack the image upload.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/28085 | vdb entry |
http://www.securityfocus.com/archive/1/489045/100/0/threaded | mailing list |
http://www.informit.com/articles/article.aspx?p=1177111 | exploit |
http://secunia.com/advisories/29221 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/40995 | vdb entry |
http://osvdb.org/42718 | vdb entry |