admin/options.php in Grestul 1.2 does not properly restrict access, which allows remote attackers to bypass authentication and create administrative accounts via a manage_admin action in a direct request.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://secunia.com/advisories/35367 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50999 | vdb entry |
https://www.exploit-db.com/exploits/8902 | exploit |