An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of blocking IP addresses using the web management interface. It seems that the device does not implement any cross-site scripting forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface into executing a cross-site scripting payload on the user's browser and execute any action on the device provided by the web management interface.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/153227/Securifi-Almond-2015-Buffer-Overflow-Command-Injection-XSS-CSRF.html | Third Party Advisory VDB Entry |
https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Securifi_Almond_plus_sec_issues.pdf | Exploit Third Party Advisory |
https://seclists.org/bugtraq/2019/Jun/8 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2019-06-18 21:15
Updated : 2024-02-04 20:20
NVD link : CVE-2017-8334
Mitre link : CVE-2017-8334
CVE.ORG link : CVE-2017-8334
JSON object : View
Products Affected
securifi
- almond_2015_firmware
- almond\+firmware
- almond
- almond_firmware
- almond\+
- almond_2015
CWE
CWE-352
Cross-Site Request Forgery (CSRF)