Paid To Read Script 2.0.5 has authentication bypass in the admin panel via a direct request, as demonstrated by the admin/viewvisitcamp.php fn parameter and the admin/userview.php uid parameter.
References
Link | Resource |
---|---|
https://github.com/d4wner/Vulnerabilities-Report/blob/master/paid-to-read-script.md | Exploit Third Party Advisory |
https://github.com/d4wner/Vulnerabilities-Report/blob/master/paid-to-read-script.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/d4wner/Vulnerabilities-Report/blob/master/paid-to-read-script.md - Exploit, Third Party Advisory |
Information
Published : 2017-12-20 03:29
Updated : 2024-11-21 03:18
NVD link : CVE-2017-17777
Mitre link : CVE-2017-17777
CVE.ORG link : CVE-2017-17777
JSON object : View
Products Affected
paid_to_read_script_project
- paid_to_read_script
CWE
CWE-287
Improper Authentication