CVE-2008-2044

includes/library.php in netOffice Dwins 1.3 p2 compares the demoSession variable to the 'true' string literal instead of the true boolean literal, which allows remote attackers to bypass authentication and execute arbitrary code by setting this variable to 1, as demonstrated by uploading a PHP script via an add action to projects_site/uploadfile.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:netoffice:dwins:1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:45

Type Values Removed Values Added
References () http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47 - () http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47 -
References () http://secunia.com/advisories/29193 - () http://secunia.com/advisories/29193 -
References () http://securityreason.com/securityalert/3845 - () http://securityreason.com/securityalert/3845 -
References () http://sourceforge.net/forum/forum.php?forum_id=814851 - () http://sourceforge.net/forum/forum.php?forum_id=814851 -
References () http://www.securityfocus.com/archive/1/488958 - Exploit () http://www.securityfocus.com/archive/1/488958 - Exploit
References () http://www.securityfocus.com/archive/1/491542/100/0/threaded - () http://www.securityfocus.com/archive/1/491542/100/0/threaded -
References () http://www.securityfocus.com/bid/28051 - () http://www.securityfocus.com/bid/28051 -

Information

Published : 2008-05-01 19:05

Updated : 2024-11-21 00:45


NVD link : CVE-2008-2044

Mitre link : CVE-2008-2044

CVE.ORG link : CVE-2008-2044


JSON object : View

Products Affected

netoffice

  • dwins
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')