LogRhythm Platform Manager (PM) 7.4.9 allows CSRF. The Web interface is vulnerable to Cross-site WebSocket Hijacking (CSWH). If a logged-in PM user visits a malicious site in the same browser session, that site can perform a CSRF attack to create a WebSocket from the victim client to the vulnerable PM server. Once the socket is created, the malicious site can interact with the vulnerable web server in the context of the logged-in user. This can include WebSocket payloads that result in command execution.
References
Link | Resource |
---|---|
https://cybercx.com.au/blog/2020/12/15/logrhythm-zero-days/ | Third Party Advisory |
https://cybercx.com.au/blog/2020/12/15/logrhythm-zero-days/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://cybercx.com.au/blog/2020/12/15/logrhythm-zero-days/ - Third Party Advisory |
Information
Published : 2020-12-17 03:15
Updated : 2024-11-21 05:17
NVD link : CVE-2020-25095
Mitre link : CVE-2020-25095
CVE.ORG link : CVE-2020-25095
JSON object : View
Products Affected
logrhythm
- platform_manager
CWE
CWE-352
Cross-Site Request Forgery (CSRF)