includes/library.php in netOffice Dwins 1.3 p2 compares the demoSession variable to the 'true' string literal instead of the true boolean literal, which allows remote attackers to bypass authentication and execute arbitrary code by setting this variable to 1, as demonstrated by uploading a PHP script via an add action to projects_site/uploadfile.php.
References
Configurations
History
21 Nov 2024, 00:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47 - | |
References | () http://secunia.com/advisories/29193 - | |
References | () http://securityreason.com/securityalert/3845 - | |
References | () http://sourceforge.net/forum/forum.php?forum_id=814851 - | |
References | () http://www.securityfocus.com/archive/1/488958 - Exploit | |
References | () http://www.securityfocus.com/archive/1/491542/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/28051 - |
Information
Published : 2008-05-01 19:05
Updated : 2024-11-21 00:45
NVD link : CVE-2008-2044
Mitre link : CVE-2008-2044
CVE.ORG link : CVE-2008-2044
JSON object : View
Products Affected
netoffice
- dwins
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')