Cross-site request forgery (CSRF) vulnerability in WSO2 Carbon 4.4.5 allows remote attackers to hijack the authentication of privileged users for requests that shutdown a server via a shutdown action to server-admin/proxy_ajaxprocessor.jsp.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2016-0101 | patch vendor advisory |
http://hyp3rlinx.altervista.org/advisories/WSO2-CARBON-v4.4.5-CSRF-DOS.txt | third party advisory exploit |
http://www.securityfocus.com/bid/92473 | third party advisory vdb entry |
http://www.securityfocus.com/archive/1/539202/100/0/threaded | mailing list |
http://packetstormsecurity.com/files/138332/WSO2-Carbon-4.4.5-Cross-Site-Request-Forgery-Denial-Of-Service.html | third party advisory vdb entry exploit |
https://www.exploit-db.com/exploits/40242/ | third party advisory vdb entry exploit |