login.php in Zenas PaoBacheca Guestbook 2.1, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative access by setting the login_ok parameter to 1.
References
| Link | Resource |
|---|---|
| http://secunia.com/advisories/36023 | Broken Link Vendor Advisory |
| http://www.exploit-db.com/exploits/9293 | Third Party Advisory VDB Entry |
| http://www.osvdb.org/56757 | Broken Link Exploit |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/52100 | Third Party Advisory VDB Entry |
Configurations
History
13 Feb 2024, 17:22
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 9.8 |
| CWE | CWE-287 | |
| References | () http://secunia.com/advisories/36023 - Broken Link, Vendor Advisory | |
| References | () http://www.exploit-db.com/exploits/9293 - Third Party Advisory, VDB Entry | |
| References | () http://www.osvdb.org/56757 - Broken Link, Exploit | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/52100 - Third Party Advisory, VDB Entry |
Information
Published : 2009-09-25 22:30
Updated : 2024-02-13 17:22
NVD link : CVE-2009-3421
Mitre link : CVE-2009-3421
CVE.ORG link : CVE-2009-3421
JSON object : View
Products Affected
zenas
- pao-bacheca_guestbook
CWE
CWE-287
Improper Authentication
