PhotoRange Photo Vault 1.2 appends the password to the URI for authorization, which makes it easier for remote attackers to bypass intended GET restrictions via a brute-force approach, as demonstrated by "GET /login.html__passwd1" and "GET /login.html__passwd2" and so on.
References
Link | Resource |
---|---|
https://www.vulnerability-lab.com/get_content.php?id=2110 | Exploit Third Party Advisory |
https://www.vulnerability-lab.com/get_content.php?id=2110 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vulnerability-lab.com/get_content.php?id=2110 - Exploit, Third Party Advisory |
Information
Published : 2018-12-23 02:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20371
Mitre link : CVE-2018-20371
CVE.ORG link : CVE-2018-20371
JSON object : View
Products Affected
photorange_photo_vault_project
- photorange_photo_vault
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor