Thomas R. Pasawicz HyperBook Guestbook 1.30 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download an admin password hash via a direct request for data/gbconfiguration.dat.
References
Link | Resource |
---|---|
http://downloads.securityfocus.com/vulnerabilities/exploits/22754.py | Exploit |
http://osvdb.org/33868 | |
http://secunia.com/advisories/24392 | |
http://www.securityfocus.com/bid/22754 | Exploit Vendor Advisory |
http://downloads.securityfocus.com/vulnerabilities/exploits/22754.py | Exploit |
http://osvdb.org/33868 | |
http://secunia.com/advisories/24392 | |
http://www.securityfocus.com/bid/22754 | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 00:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.securityfocus.com/vulnerabilities/exploits/22754.py - Exploit | |
References | () http://osvdb.org/33868 - | |
References | () http://secunia.com/advisories/24392 - | |
References | () http://www.securityfocus.com/bid/22754 - Exploit, Vendor Advisory |
Information
Published : 2007-03-02 21:18
Updated : 2025-04-09 00:30
NVD link : CVE-2007-1192
Mitre link : CVE-2007-1192
CVE.ORG link : CVE-2007-1192
JSON object : View
Products Affected
hyperbook
- guestbook
CWE