Darktrace Enterprise Immune System before 3.1 allows CSRF via the /config endpoint.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://seclists.org/bugtraq/2019/May/54 | mailing list third party advisory exploit |
http://packetstormsecurity.com/files/152986/Darktrace-Enterpise-Immune-System-3.0.9-3.0.10-Cross-Site-Request-Forgery.html | third party advisory vdb entry exploit |
https://www.peerlyst.com/posts/exploiting-two-zero-days-in-a-darktrace-appliance-cve-2019-9596-and-cve-2019-9597-gerwout-van-der-veen | third party advisory exploit technical description |
https://github.com/gerwout/CVE-2019-9596-and-CVE-2019-9597/blob/master/poc.html | third party advisory exploit |