First published: Wed Sep 13 2017(Updated: )
In Apache Brooklyn before 0.10.0, the REST server is vulnerable to cross-site request forgery (CSRF), which could permit a malicious web site to produce a link which, if clicked whilst a user is logged in to Brooklyn, would cause the server to execute the attacker's commands as the user. There is known to be a proof-of-concept exploit using this vulnerability.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Brooklyn | <=0.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8737 is classified as a moderate severity cross-site request forgery (CSRF) vulnerability.
To fix CVE-2016-8737, upgrade Apache Brooklyn to version 0.10.0 or later.
CVE-2016-8737 affects users of Apache Brooklyn versions prior to 0.10.0.
An attacker could potentially execute unauthorized commands on the server as an authenticated user if the victim clicks a malicious link.
Currently, the recommended solution is to upgrade to a secure version, as there are no known effective workarounds for CVE-2016-8737.