CVE-2007-1192

Thomas R. Pasawicz HyperBook Guestbook 1.30 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download an admin password hash via a direct request for data/gbconfiguration.dat.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hyperbook:guestbook:1.30:*:*:*:*:*:*:*

History

21 Nov 2024, 00:27

Type Values Removed Values Added
References () http://downloads.securityfocus.com/vulnerabilities/exploits/22754.py - Exploit () http://downloads.securityfocus.com/vulnerabilities/exploits/22754.py - Exploit
References () http://osvdb.org/33868 - () http://osvdb.org/33868 -
References () http://secunia.com/advisories/24392 - () http://secunia.com/advisories/24392 -
References () http://www.securityfocus.com/bid/22754 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/22754 - Exploit, Vendor Advisory

Information

Published : 2007-03-02 21:18

Updated : 2025-04-09 00:30


NVD link : CVE-2007-1192

Mitre link : CVE-2007-1192

CVE.ORG link : CVE-2007-1192


JSON object : View

Products Affected

hyperbook

  • guestbook