Headstart Solutions DeskPRO does not require authentication for certain files and directories associated with administrative activities, which allows remote attackers to (1) reinstall the application via a direct request for install/index.php; (2) delete the database via a do=delete_database QUERY_STRING to a renamed copy of install/index.php; or access the administration system, after guessing a filename, via a direct request for a file in (3) admin/ or (4) tech/.
References
Link | Resource |
---|---|
http://www.zion-security.com/text/Mul_Vulnerability_DeskPro.txt | Exploit Vendor Advisory |
http://www.zion-security.com/text/Mul_Vulnerability_DeskPro.txt | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.zion-security.com/text/Mul_Vulnerability_DeskPro.txt - Exploit, Vendor Advisory |
Information
Published : 2007-02-07 20:28
Updated : 2024-11-21 00:24
NVD link : CVE-2006-6973
Mitre link : CVE-2006-6973
CVE.ORG link : CVE-2006-6973
JSON object : View
Products Affected
headstart_solutions
- deskpro
CWE