CVE-2008-1475

The xml-rpc server in Roundup 1.4.4 does not check property permissions, which allows attackers to bypass restrictions and edit or read restricted properties via the (1) list, (2) display, and (3) set methods.
References
Link Resource
http://secunia.com/advisories/29336 Vendor Advisory
http://secunia.com/advisories/29375 Vendor Advisory
http://secunia.com/advisories/30274
http://secunia.com/advisories/32805
http://security.gentoo.org/glsa/glsa-200805-21.xml
http://sourceforge.net/tracker/index.php?func=detail&aid=1907211&group_id=31577&atid=402788
http://www.securityfocus.com/bid/28238
http://www.vupen.com/english/advisories/2008/0891
https://bugzilla.redhat.com/show_bug.cgi?id=436546
https://exchange.xforce.ibmcloud.com/vulnerabilities/41240
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00452.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00478.html
http://secunia.com/advisories/29336 Vendor Advisory
http://secunia.com/advisories/29375 Vendor Advisory
http://secunia.com/advisories/30274
http://secunia.com/advisories/32805
http://security.gentoo.org/glsa/glsa-200805-21.xml
http://sourceforge.net/tracker/index.php?func=detail&aid=1907211&group_id=31577&atid=402788
http://www.securityfocus.com/bid/28238
http://www.vupen.com/english/advisories/2008/0891
https://bugzilla.redhat.com/show_bug.cgi?id=436546
https://exchange.xforce.ibmcloud.com/vulnerabilities/41240
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00452.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00478.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:roundup-tracker:roundup:*:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.2.4:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.2.5:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.2.6:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.2.7:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.2.8:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre1:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre2:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre3:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.4.0:b1:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.4.0:b2:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.4.2:pr1:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.0:beta1:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.0:pr1:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.6:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.7:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.8:stable:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.5.9:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.0:b1:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.0:b2:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.0:b3:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.0:b4:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.6:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.7:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.8:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.9:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.10:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.6.11:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.0:b1:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.0:b2:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.0:b3:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.5:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.6:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.7:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.8:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.9:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.10:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.11:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.7.12:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.8.0:b1:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.8.0:b2:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:0.9.0:b1:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:roundup-tracker:roundup:1.4.2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:44

Type Values Removed Values Added
References () http://secunia.com/advisories/29336 - Vendor Advisory () http://secunia.com/advisories/29336 - Vendor Advisory
References () http://secunia.com/advisories/29375 - Vendor Advisory () http://secunia.com/advisories/29375 - Vendor Advisory
References () http://secunia.com/advisories/30274 - () http://secunia.com/advisories/30274 -
References () http://secunia.com/advisories/32805 - () http://secunia.com/advisories/32805 -
References () http://security.gentoo.org/glsa/glsa-200805-21.xml - () http://security.gentoo.org/glsa/glsa-200805-21.xml -
References () http://sourceforge.net/tracker/index.php?func=detail&aid=1907211&group_id=31577&atid=402788 - () http://sourceforge.net/tracker/index.php?func=detail&aid=1907211&group_id=31577&atid=402788 -
References () http://www.securityfocus.com/bid/28238 - () http://www.securityfocus.com/bid/28238 -
References () http://www.vupen.com/english/advisories/2008/0891 - () http://www.vupen.com/english/advisories/2008/0891 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=436546 - () https://bugzilla.redhat.com/show_bug.cgi?id=436546 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41240 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41240 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html - () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00264.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html - () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00375.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00452.html - () https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00452.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00478.html - () https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00478.html -

Information

Published : 2008-03-24 22:44

Updated : 2024-11-21 00:44


NVD link : CVE-2008-1475

Mitre link : CVE-2008-1475

CVE.ORG link : CVE-2008-1475


JSON object : View

Products Affected

roundup-tracker

  • roundup
CWE
CWE-264

Permissions, Privileges, and Access Controls