cve/2015/CVE-2015-2878.md

18 lines
958 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-2878](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2878)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Multiple cross-site request forgery (CSRF) vulnerabilities in Hexis HawkEye G 3.0.1.4912 allow remote attackers to hijack the authentication of administrators for requests that (1) add arbitrary accounts via the name parameter to interface/rest/accounts/json; turn off the (2) Url matching, (3) DNS Inject, or (4) IP Redirect Sensor in a request to interface/rest/dpi/setEnabled/1; or (5) perform whitelisting of malware MD5 hash IDs via the id parameter to interface/rest/md5-threats/whitelist.
### POC
#### Reference
- https://www.exploit-db.com/exploits/37686/
#### Github
No PoCs found on GitHub currently.