#VU16602 Spoofing attack in Event Streams - CVE-2018-1833
Published: December 18, 2018 / Updated: December 18, 2018
Event Streams
IBM Corporation
Description
The vulnerability allows a remote attacker to conduct spoofing attack on the target system.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can submit an API request with a fake Host request header, gain authorised access via the CLI and spoof the request header.