Pheap 2.0 allows remote attackers to bypass authentication by setting a pheap_login cookie value to the administrator's username, which can be used to (1) obtain sensitive information, including the administrator password, via settings.php or (2) upload and execute arbitrary PHP code via an update_doc action in edit.php.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://osvdb.org/36737 | vdb entry |
https://www.exploit-db.com/exploits/4006 | exploit |
http://secunia.com/advisories/25460 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34592 | vdb entry |