Multiple cross-site request forgery (CSRF) vulnerabilities in WS-Proxy in Eye-Fi 1.1.2 allow remote attackers to hijack the authentication of users for requests that modify configuration via a SOAPAction parameter of (1) urn:SetOptions for autostart, (2) urn:SetDesktopSync for file upload, or (3) urn:SetFolderConfig for file download location or modification of authentication credentials; and (4) urn:AddNetwork for adding an arbitrary Service Set Identifier (SSID) to hijack the image upload.
References
Configurations
History
21 Nov 2024, 00:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/42718 - | |
References | () http://secunia.com/advisories/29221 - Vendor Advisory | |
References | () http://www.informit.com/articles/article.aspx?p=1177111 - Exploit | |
References | () http://www.securityfocus.com/archive/1/489045/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/28085 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/40995 - |
Information
Published : 2009-09-01 16:30
Updated : 2024-11-21 00:58
NVD link : CVE-2008-7139
Mitre link : CVE-2008-7139
CVE.ORG link : CVE-2008-7139
JSON object : View
Products Affected
eye.fi
- eye-fi_manager
CWE
CWE-352
Cross-Site Request Forgery (CSRF)