Описание
oj.cgi in OpenJournal 2.0 through 2.0.5 allows remote attackers to bypass authentication and access the control panel via a 0 in the uid parameter.
Ссылки
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:openjournal:openjournal:2.0:*:*:*:*:*:*:*
cpe:2.3:a:openjournal:openjournal:2.0_1:*:*:*:*:*:*:*
cpe:2.3:a:openjournal:openjournal:2.0_2:*:*:*:*:*:*:*
cpe:2.3:a:openjournal:openjournal:2.0_3:*:*:*:*:*:*:*
cpe:2.3:a:openjournal:openjournal:2.0_4:*:*:*:*:*:*:*
cpe:2.3:a:openjournal:openjournal:2.0_5:*:*:*:*:*:*:*
EPSS
Процентиль: 86%
0.02832
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
oj.cgi in OpenJournal 2.0 through 2.0.5 allows remote attackers to bypass authentication and access the control panel via a 0 in the uid parameter.
EPSS
Процентиль: 86%
0.02832
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other