Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h44r-74rh-f8hh

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

PHProjekt 2.0 through 3.1 relies on the $PHP_SELF variable for authentication, which allows remote attackers to bypass authentication for scripts via a request to a .php file with "sms" in the URL, which is included in the PATH_INFO portion of the $PHP_SELF variable, as demonstrated using "mail_send.php/sms".

PHProjekt 2.0 through 3.1 relies on the $PHP_SELF variable for authentication, which allows remote attackers to bypass authentication for scripts via a request to a .php file with "sms" in the URL, which is included in the PATH_INFO portion of the $PHP_SELF variable, as demonstrated using "mail_send.php/sms".

EPSS

Процентиль: 88%
0.04003
Низкий

Связанные уязвимости

nvd
больше 22 лет назад

PHProjekt 2.0 through 3.1 relies on the $PHP_SELF variable for authentication, which allows remote attackers to bypass authentication for scripts via a request to a .php file with "sms" in the URL, which is included in the PATH_INFO portion of the $PHP_SELF variable, as demonstrated using "mail_send.php/sms".

EPSS

Процентиль: 88%
0.04003
Низкий