cvelist/2008/7xxx/CVE-2008-7024.json

88 lines
2.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2008-7024",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "admin.php in Arz Development The Gemini Portal 4.7 and earlier allows remote attackers to bypass authentication and gain administrator privileges by setting the user cookie to \"admin\" and setting the name parameter to \"users.\""
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20080926 The Gemini Portal <= 4.7 / Insecure Cookie Handling Vulnerability",
"refsource" : "BUGTRAQ",
2018-10-11 16:05:44 -04:00
"url" : "http://www.securityfocus.com/archive/1/496761/100/0/threaded"
2017-10-16 12:31:07 -04:00
},
{
"name" : "6584",
"refsource" : "EXPLOIT-DB",
2017-10-16 12:31:07 -04:00
"url" : "https://www.exploit-db.com/exploits/6584"
},
{
"name" : "31429",
"refsource" : "BID",
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/31429"
},
{
"name" : "48639",
"refsource" : "OSVDB",
2017-10-16 12:31:07 -04:00
"url" : "http://osvdb.org/48639"
},
{
"name" : "32057",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/32057"
},
{
"name" : "geminiportal-admin-security-bypass(45439)",
"refsource" : "XF",
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45439"
}
]
}
}