CVE-2018-6651

In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim's computer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:uncurl_project:uncurl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:parsecgaming:parsec:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:11

Type Values Removed Values Added
References () https://gist.github.com/Zenexer/ac7601c0e367d876353137e5099b18a7 - () https://gist.github.com/Zenexer/ac7601c0e367d876353137e5099b18a7 -
References () https://github.com/chrisd1100/uncurl/commit/448cd13e7b18c83855d706c564341ddd1e38e769 - Patch, Third Party Advisory () https://github.com/chrisd1100/uncurl/commit/448cd13e7b18c83855d706c564341ddd1e38e769 - Patch, Third Party Advisory
References () https://github.com/chrisd1100/uncurl/releases/tag/0.07 - Third Party Advisory () https://github.com/chrisd1100/uncurl/releases/tag/0.07 - Third Party Advisory

Information

Published : 2018-02-05 22:29

Updated : 2024-11-21 04:11


NVD link : CVE-2018-6651

Mitre link : CVE-2018-6651

CVE.ORG link : CVE-2018-6651


JSON object : View

Products Affected

uncurl_project

  • uncurl

parsecgaming

  • parsec
CWE
CWE-352

Cross-Site Request Forgery (CSRF)