Description
Multiple cross-site request forgery (CSRF) vulnerabilities in ajax.html in Profense Web Application Firewall 2.6.2 and 2.6.3 allow remote attackers to hijack the authentication of administrators for requests that (1) shutdown the server, (2) send ping packets, (3) enable network services, (4) configure a proxy server, and (5) modify other settings via parameters in the query string.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Michael Brooks · textremotewindows
https://www.exploit-db.com/exploits/7919
References (4)
Core 4
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/33523
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/51660
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7919
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33739
Scores
EPSS
0.0030
EPSS Percentile
53.5%
Details
CWE
CWE-352
Status
published
Products (2)
armorlogic/profense_web_application_firewall
2.6.2
armorlogic/profense_web_application_firewall
2.6.3
Published
Feb 10, 2009
Tracked Since
Feb 18, 2026