Sophos Cyberoam UTM CR25iNG 10.6.3 MR-5 allows remote authenticated users to bypass intended access restrictions via direct object reference, as demonstrated by a request for Licenseinformation.jsp. This is fixed in 10.6.5.
References
Link | Resource |
---|---|
https://infosecninja.blogspot.in/2017/04/cve-2016-7786-sophos-cyberoam-utm.html | Technical Description Third Party Advisory |
https://www.exploit-db.com/exploits/44469/ | |
https://infosecninja.blogspot.in/2017/04/cve-2016-7786-sophos-cyberoam-utm.html | Technical Description Third Party Advisory |
https://www.exploit-db.com/exploits/44469/ |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://infosecninja.blogspot.in/2017/04/cve-2016-7786-sophos-cyberoam-utm.html - Technical Description, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44469/ - |
Information
Published : 2017-04-07 21:59
Updated : 2024-11-21 02:58
NVD link : CVE-2016-7786
Mitre link : CVE-2016-7786
CVE.ORG link : CVE-2016-7786
JSON object : View
Products Affected
sophos
- cyberoam_cr25ing_utm_firmware
- cyberoam_cr25ing_utm
CWE
CWE-264
Permissions, Privileges, and Access Controls