First published: Wed Nov 30 2016(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in IBM QRadar SIEM 7.1 before MR2 Patch 13 and 7.2 before 7.2.7 allow remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Security Information and Event Manager | =7.1.0 | |
IBM QRadar Security Information and Event Manager | =7.2.0 | |
IBM QRadar Security Information and Event Manager | =7.2.1 | |
IBM QRadar Security Information and Event Manager | =7.2.2 | |
IBM QRadar Security Information and Event Manager | =7.2.3 | |
IBM QRadar Security Information and Event Manager | =7.2.4 | |
IBM QRadar Security Information and Event Manager | =7.2.5 | |
IBM QRadar Security Information and Event Manager | =7.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2878 is classified as a moderate severity vulnerability due to its potential to allow CSRF attacks.
To fix CVE-2016-2878, upgrade IBM QRadar SIEM to version 7.1 MR2 Patch 13 or 7.2 version 7.2.7 or later.
CVE-2016-2878 allows remote attackers to hijack user authentication through various CSRF attacks.
CVE-2016-2878 affects IBM QRadar SIEM versions 7.1 before MR2 Patch 13 and 7.2 before version 7.2.7.
User interaction is typically required for the exploitation of CVE-2016-2878, as the attack relies on tricking users into making requests.