cve/2018/CVE-2018-6651.md

19 lines
885 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-6651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6651)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim's computer.
### POC
#### Reference
- https://gist.github.com/Zenexer/ac7601c0e367d876353137e5099b18a7
2024-06-09 00:33:16 +00:00
- https://gist.github.com/Zenexer/ac7601c0e367d876353137e5099b18a7
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.