Mavili Guestbook, as released in November 2007, allows remote attackers to edit, delete, and approve arbitrary messages via a direct request to (1) edit.asp, (2) delete.asp, or (3) approve.asp.
References
Configurations
History
21 Nov 2024, 01:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-01/0010.html - Exploit | |
References | () http://code.google.com/p/maviliguestbook/issues/detail?id=1 - | |
References | () http://www.securityfocus.com/bid/51252 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/72099 - |
Information
Published : 2012-10-04 17:55
Updated : 2024-11-21 01:44
NVD link : CVE-2012-5299
Mitre link : CVE-2012-5299
CVE.ORG link : CVE-2012-5299
JSON object : View
Products Affected
mavili_guestbook_project
- mavili_guestbook
CWE
CWE-264
Permissions, Privileges, and Access Controls