Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2049

Опубликовано: 01 фев. 2016
Источник: debian

Описание

examples/consumer/common.php in JanRain PHP OpenID library (aka php-openid) improperly checks the openid.realm parameter against the SERVER_NAME element in the SERVER superglobal array, which might allow remote attackers to hijack the authentication of arbitrary users via vectors involving a crafted HTTP Host header.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-openidunfixedpackage

Примечания

  • sample code only, actual vulnerable code not shipped in package

  • https://www.openwall.com/lists/oss-security/2016/01/24/2

  • https://github.com/openid/php-openid/issues/128

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 10 лет назад

examples/consumer/common.php in JanRain PHP OpenID library (aka php-openid) improperly checks the openid.realm parameter against the SERVER_NAME element in the SERVER superglobal array, which might allow remote attackers to hijack the authentication of arbitrary users via vectors involving a crafted HTTP Host header.

CVSS3: 8.8
nvd
около 10 лет назад

examples/consumer/common.php in JanRain PHP OpenID library (aka php-openid) improperly checks the openid.realm parameter against the SERVER_NAME element in the SERVER superglobal array, which might allow remote attackers to hijack the authentication of arbitrary users via vectors involving a crafted HTTP Host header.

CVSS3: 8.8
github
больше 3 лет назад

examples/consumer/common.php in JanRain PHP OpenID library (aka php-openid) improperly checks the openid.realm parameter against the SERVER_NAME element in the SERVER superglobal array, which might allow remote attackers to hijack the authentication of arbitrary users via vectors involving a crafted HTTP Host header.