CNVD-2015-03785

Vulnerability from cnvd - Published: 2015-06-15
VLAI Severity ?
Title
Alcatel OmniSwitch WEB接口跨站请求伪造漏洞
Description
Alcatel OmniSwitch是一款企业级交换机。 Alcatel OmniSwitch WEB接口存在跨站请求伪造漏洞,允许远程攻击者构建恶意URI,诱使用户解析,可以目标用户上下文执行恶意操作。
Severity
Formal description

目前没有详细解决方案提供: http://enterprise.alcatel-lucent.com/

Reference
https://www.redteam-pentesting.de/advisories/rt-sa-2015-004
Impacted products
Name
['Alcatel OmniSwitch 6860', 'Alcatel OmniSwitch 10K', 'Alcatel OmniSwitch 6900', 'Alcatel OmniSwitch 6855', 'Alcatel OmniSwitch 6400', 'Alcatel OmniSwitch 9000E', 'Alcatel OmniSwitch 6850E', 'Alcatel OmniSwitch 6250', 'Alcatel OmniSwitch 6450', 'Alcatel OmniSwitch 7700', 'Alcatel OmniSwitch 7800']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "75121"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2015-2805"
    }
  },
  "description": "Alcatel OmniSwitch\u662f\u4e00\u6b3e\u4f01\u4e1a\u7ea7\u4ea4\u6362\u673a\u3002\r\n\r\nAlcatel OmniSwitch WEB\u63a5\u53e3\u5b58\u5728\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u6784\u5efa\u6076\u610fURI\uff0c\u8bf1\u4f7f\u7528\u6237\u89e3\u6790\uff0c\u53ef\u4ee5\u76ee\u6807\u7528\u6237\u4e0a\u4e0b\u6587\u6267\u884c\u6076\u610f\u64cd\u4f5c\u3002",
  "discovererName": "unknown",
  "formalWay": "\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u89e3\u51b3\u65b9\u6848\u63d0\u4f9b\uff1a\r\nhttp://enterprise.alcatel-lucent.com/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2015-03785",
  "openTime": "2015-06-15",
  "products": {
    "product": [
      "Alcatel OmniSwitch 6860",
      "Alcatel OmniSwitch 10K",
      "Alcatel OmniSwitch 6900",
      "Alcatel OmniSwitch 6855",
      "Alcatel OmniSwitch 6400",
      "Alcatel OmniSwitch 9000E",
      "Alcatel OmniSwitch 6850E",
      "Alcatel OmniSwitch 6250",
      "Alcatel OmniSwitch 6450",
      "Alcatel OmniSwitch 7700",
      "Alcatel OmniSwitch 7800"
    ]
  },
  "referenceLink": "https://www.redteam-pentesting.de/advisories/rt-sa-2015-004",
  "serverity": "\u4f4e",
  "submitTime": "2015-06-11",
  "title": "Alcatel OmniSwitch WEB\u63a5\u53e3\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…