Описание
In Webgalamb through 7.0, system/ajax.php functionality is supposed to be available only to the administrator. However, by using one of the bgsend, atment_sddd1xGz, or xls_bgimport query parameters, most of these methods become available to unauthenticated users.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 7.0 (включая)
cpe:2.3:a:ens:webgalamb:*:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06487
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-863
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
In Webgalamb through 7.0, system/ajax.php functionality is supposed to be available only to the administrator. However, by using one of the bgsend, atment_sddd1xGz, or xls_bgimport query parameters, most of these methods become available to unauthenticated users.
EPSS
Процентиль: 91%
0.06487
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-863