Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3f7c-f4gm-hmv7

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

HID OMNIKEY 5427 and OMNIKEY 5127 readers are vulnerable to CSRF when using the EEM driver (Ethernet Emulation Mode). By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to upload a configuration file to the device. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.

HID OMNIKEY 5427 and OMNIKEY 5127 readers are vulnerable to CSRF when using the EEM driver (Ethernet Emulation Mode). By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to upload a configuration file to the device. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.

EPSS

Процентиль: 44%
0.00214
Низкий

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 9.6
nvd
почти 5 лет назад

HID OMNIKEY 5427 and OMNIKEY 5127 readers are vulnerable to CSRF when using the EEM driver (Ethernet Emulation Mode). By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to upload a configuration file to the device. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.

CVSS3: 8.8
fstec
больше 5 лет назад

Уязвимость драйвера EEM (Ethernet Emulation Mode) микропрограммного обеспечения устройств для считывания смарт-карт серии OMNIKEY 5427 и серии OMNIKEY 5127, позволяющая нарушителю проводить межсайтовые сценарные атаки

EPSS

Процентиль: 44%
0.00214
Низкий

Дефекты

CWE-352