CVE-2005-0440

ELOG before 2.5.7 allows remote attackers to bypass authentication and download a configuration file that contains a sensitive write password via a modified URL.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.4:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.5:*:*:*:*:*:*:*
cpe:2.3:a:stefan_ritt:elog_web_logbook:2.5.6:*:*:*:*:*:*:*

History

20 Nov 2024, 23:55

Type Values Removed Values Added
References () http://midas.psi.ch/elogs/Forum/941 - Vendor Advisory () http://midas.psi.ch/elogs/Forum/941 - Vendor Advisory
References () http://sourceforge.net/project/shownotes.php?group_id=40505&release_id=304880 - Patch () http://sourceforge.net/project/shownotes.php?group_id=40505&release_id=304880 - Patch
References () http://www.securityfocus.com/bid/12556 - Patch () http://www.securityfocus.com/bid/12556 - Patch

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:55


NVD link : CVE-2005-0440

Mitre link : CVE-2005-0440

CVE.ORG link : CVE-2005-0440


JSON object : View

Products Affected

stefan_ritt

  • elog_web_logbook