Gallarific does not require authentication for (1) users.php and (2) index.php, which allows remote attackers to add and edit tasks via a direct request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/28163 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41106 | vdb entry |
http://downloads.securityfocus.com/vulnerabilities/exploits/28163.html | exploit |
http://secunia.com/advisories/29399 | third party advisory vendor advisory |
https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3%40%3Cissues.struts.apache.org%3E | mailing list |
https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db%40%3Cissues.struts.apache.org%3E | mailing list |