Ultimate PHP Board (UPB) 1.9.6 and earlier uses a cryptographically weak block cipher with a large key collision space, which allows remote attackers to determine a suitable decryption key given the plaintext and ciphertext by obtaining the plaintext password, which is sent when logging in, and the ciphertext, which is set in the pass_env cookie.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/1138 - | |
References | () http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt - Exploit, URL Repurposed | |
References | () http://www.securityfocus.com/archive/1/437875/100/0/threaded - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt - Exploit, URL Repurposed |
Information
Published : 2006-06-24 01:06
Updated : 2024-11-21 00:13
NVD link : CVE-2006-3204
Mitre link : CVE-2006-3204
CVE.ORG link : CVE-2006-3204
JSON object : View
Products Affected
ultimate_php_board
- ultimate_php_board
CWE