Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w2cx-mr55-3j2f

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

admin/send_mod.php in Gregory Kokanosky phpMyNewsletter 0.8 beta5 and earlier prints a Location header but does not exit when administrative credentials are missing, which allows remote attackers to compose an e-mail message via a post with the subject, message, format, and list_id fields; and send the message via a direct request for the MsgId value under admin/.

admin/send_mod.php in Gregory Kokanosky phpMyNewsletter 0.8 beta5 and earlier prints a Location header but does not exit when administrative credentials are missing, which allows remote attackers to compose an e-mail message via a post with the subject, message, format, and list_id fields; and send the message via a direct request for the MsgId value under admin/.

EPSS

Процентиль: 90%
0.05958
Низкий

Связанные уязвимости

nvd
почти 19 лет назад

admin/send_mod.php in Gregory Kokanosky phpMyNewsletter 0.8 beta5 and earlier prints a Location header but does not exit when administrative credentials are missing, which allows remote attackers to compose an e-mail message via a post with the subject, message, format, and list_id fields; and send the message via a direct request for the MsgId value under admin/.

EPSS

Процентиль: 90%
0.05958
Низкий