CVE-2016-6603

ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to bypass authentication and impersonate arbitrary users via the UserName HTTP header.
References
Link Resource
http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2016/Aug/54 Exploit Mailing List Third Party Advisory
http://www.securityfocus.com/archive/1/539159/100/0/threaded
http://www.securityfocus.com/bid/92402 Third Party Advisory VDB Entry
https://blogs.securiteam.com/index.php/archives/2712 Exploit Technical Description Third Party Advisory
https://forums.webnms.com/topic/recent-vulnerabilities-in-webnms-and-how-to-protect-the-server-against-them
https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt Exploit Third Party Advisory
https://www.exploit-db.com/exploits/40229/ Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2016/Aug/54 Exploit Mailing List Third Party Advisory
http://www.securityfocus.com/archive/1/539159/100/0/threaded
http://www.securityfocus.com/bid/92402 Third Party Advisory VDB Entry
https://blogs.securiteam.com/index.php/archives/2712 Exploit Technical Description Third Party Advisory
https://forums.webnms.com/topic/recent-vulnerabilities-in-webnms-and-how-to-protect-the-server-against-them
https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt Exploit Third Party Advisory
https://www.exploit-db.com/exploits/40229/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zohocorp:webnms_framework:5.2:*:*:*:*:*:*:*
cpe:2.3:a:zohocorp:webnms_framework:5.2:sp1:*:*:*:*:*:*

History

21 Nov 2024, 02:56

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2016/Aug/54 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2016/Aug/54 - Exploit, Mailing List, Third Party Advisory
References () http://www.securityfocus.com/archive/1/539159/100/0/threaded - () http://www.securityfocus.com/archive/1/539159/100/0/threaded -
References () http://www.securityfocus.com/bid/92402 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92402 - Third Party Advisory, VDB Entry
References () https://blogs.securiteam.com/index.php/archives/2712 - Exploit, Technical Description, Third Party Advisory () https://blogs.securiteam.com/index.php/archives/2712 - Exploit, Technical Description, Third Party Advisory
References () https://forums.webnms.com/topic/recent-vulnerabilities-in-webnms-and-how-to-protect-the-server-against-them - () https://forums.webnms.com/topic/recent-vulnerabilities-in-webnms-and-how-to-protect-the-server-against-them -
References () https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt - Exploit, Third Party Advisory () https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/40229/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/40229/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2017-01-23 21:59

Updated : 2024-11-21 02:56


NVD link : CVE-2016-6603

Mitre link : CVE-2016-6603

CVE.ORG link : CVE-2016-6603


JSON object : View

Products Affected

zohocorp

  • webnms_framework
CWE
CWE-20

Improper Input Validation