Cross-site request forgery (CSRF) vulnerability in the admin terminal in Hawt.io allows remote attackers to hijack the authentication of arbitrary users for requests that run commands on the Karaf server, as demonstrated by running "shutdown -f."
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://infocon.org/cons/SyScan/SyScan%202015%20Singapore/SyScan%202015%20Singapore%20presentations/SyScan15%20David%20Jorm%20-%20Finding%20and%20exploiting%20novel%20flaws%20in%20Java%20software.pdf | issue tracking third party advisory |
https://github.com/hawtio/hawtio/commit/b4e23e002639c274a2f687ada980118512f06113 | issue tracking third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1072681 | issue tracking third party advisory patch |