CRE Loaded before 6.2.14, and possibly other versions before 6.3.x, allows remote attackers to bypass authentication and gain administrator privileges via a request with (1) login.php or (2) password_forgotten.php appended as the PATH_INFO, which bypasses a check that uses PHP_SELF, which is not properly handled by (a) includes/application_top.php and (b) admin/includes/application_top.php, as exploited in the wild in 2009.
References
Link | Resource |
---|---|
http://hosting-4-creloaded.com/node/116 | Exploit URL Repurposed |
https://www.creloaded.com/fdm_file_detail.php?file_id=191 | Patch Vendor Advisory |
http://hosting-4-creloaded.com/node/116 | Exploit URL Repurposed |
https://www.creloaded.com/fdm_file_detail.php?file_id=191 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://hosting-4-creloaded.com/node/116 - Exploit, URL Repurposed | |
References | () https://www.creloaded.com/fdm_file_detail.php?file_id=191 - Patch, Vendor Advisory |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://hosting-4-creloaded.com/node/116 - Exploit, URL Repurposed |
Information
Published : 2011-06-08 10:36
Updated : 2024-11-21 01:11
NVD link : CVE-2009-5076
Mitre link : CVE-2009-5076
CVE.ORG link : CVE-2009-5076
JSON object : View
Products Affected
creloaded
- cre_loaded
CWE
CWE-287
Improper Authentication