CVE-2008-1106

high

Description

The management interface in Akamai Client (formerly Red Swoosh) 3322 and earlier allows remote attackers to bypass authentication via an HTTP request that contains (1) no Referer header, or (2) a spoofed Referer header that matches an approved domain, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and force the client to download and execute arbitrary files.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/42895

http://www.vupen.com/english/advisories/2008/1761/references

http://www.securitytracker.com/id?1020208

http://www.securityfocus.com/archive/1/493170/100/0/threaded

http://www.securityfocus.com/archive/1/493169/100/0/threaded

http://securityreason.com/securityalert/3930

http://secunia.com/secunia_research/2008-19/advisory/

http://secunia.com/advisories/30135

Details

Source: Mitre, NVD

Published: 2008-06-09

Updated: 2018-10-11

Risk Information

CVSS v2

Base Score: 7.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:C/A:N

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High