This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally. An attacker can cause a victims browser to emit an HTTP request to an arbitrary URL in the application.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bigfix_inventory | Hcltech | 9.0 (including) | 10.0.7.0 (excluding) |