login.php in Zenas PaoBacheca Guestbook 2.1, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative access by setting the login_ok parameter to 1.
References
Link | Resource |
---|---|
http://secunia.com/advisories/36023 | Broken Link Vendor Advisory |
http://www.exploit-db.com/exploits/9293 | Third Party Advisory VDB Entry |
http://www.osvdb.org/56757 | Broken Link Exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/52100 | Third Party Advisory VDB Entry |
Configurations
History
13 Feb 2024, 17:22
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 9.8 |
CWE | CWE-287 | |
References | () http://secunia.com/advisories/36023 - Broken Link, Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/9293 - Third Party Advisory, VDB Entry | |
References | () http://www.osvdb.org/56757 - Broken Link, Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/52100 - Third Party Advisory, VDB Entry |
Information
Published : 2009-09-25 22:30
Updated : 2024-02-13 17:22
NVD link : CVE-2009-3421
Mitre link : CVE-2009-3421
CVE.ORG link : CVE-2009-3421
JSON object : View
Products Affected
zenas
- pao-bacheca_guestbook
CWE
CWE-287
Improper Authentication