TutorialCMS 1.01 and earlier, when register_globals is enabled, allows remote attackers to bypass authentication via the (1) loggedIn and (2) activated parameters to (a) login.php, (b) headerLinks.php, (c) submit1.php, (d) myFav.php, and (e) userCP.php.
Link | Tags |
---|---|
http://secunia.com/advisories/25358 | third party advisory vendor advisory |
https://www.exploit-db.com/exploits/3963 | exploit |
http://www.wavelinkmedia.com/scripts/tutorialcms/ | |
http://osvdb.org/36520 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34401 | vdb entry |
http://www.vupen.com/english/advisories/2007/1903 | vdb entry |