GR Board (aka grboard) 1.8.6.5 Community Edition does not require authentication for certain database actions, which allows remote attackers to modify or delete data via a request to (1) mod_rewrite.php, (2) comment_write_ok.php, (3) poll/index.php, (4) update/index.php, (5) trackback.php, or (6) an arbitrary poll.php script under theme/.
References
Link | Resource |
---|---|
http://sirini.net/grboard/board.php?id=developer&articleNo=591 | Exploit URL Repurposed |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75856 | |
http://sirini.net/grboard/board.php?id=developer&articleNo=591 | Exploit URL Repurposed |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75856 |
Configurations
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://sirini.net/grboard/board.php?id=developer&articleNo=591 - Exploit, URL Repurposed | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75856 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://sirini.net/grboard/board.php?id=developer&articleNo=591 - Exploit, URL Repurposed |
Information
Published : 2012-05-24 00:55
Updated : 2024-11-21 01:33
NVD link : CVE-2011-5090
Mitre link : CVE-2011-5090
CVE.ORG link : CVE-2011-5090
JSON object : View
Products Affected
grboard
- grboard
CWE
CWE-287
Improper Authentication