TROYANOSYVIRUS
Retour aux CVEs

CVE-2008-1106

N/A

Description

The management interface in Akamai Client (formerly Red Swoosh) 3322 and earlier allows remote attackers to bypass authentication via an HTTP request that contains (1) no Referer header, or (2) a spoofed Referer header that matches an approved domain, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and force the client to download and execute arbitrary files.

Details CVE

Score CVSS v3.1N/A
Publie6/9/2008
Derniere modification4/9/2025
Sourcenvd
Observations honeypot0

Produits affectes

akamai_technologies:clientred_swoosh:client

Faiblesses (CWE)

CWE-287CWE-352

References

http://secunia.com/advisories/30135(PSIRT-CNA@flexerasoftware.com)
http://securityreason.com/securityalert/3930(PSIRT-CNA@flexerasoftware.com)
http://www.securitytracker.com/id?1020208(PSIRT-CNA@flexerasoftware.com)
http://secunia.com/advisories/30135(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/secunia_research/2008-19/advisory/(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/3930(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1020208(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.