The "IP address range limitation" function in OpenPNE 1.6 through 1.8, 2.0 through 2.8, 2.10 through 2.14, and 3.0 through 3.4, when mobile device support is enabled, allows remote attackers to bypass the "simple login" functionality via unknown vectors related to spoofing.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.openpne.jp/archives/4612/ | vendor advisory |
http://www.ipa.go.jp/security/vuln/alert/201003_openpne.html | |
http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000006.html | third party advisory |
http://secunia.com/advisories/38857 | third party advisory vendor advisory |
http://jvn.jp/en/jp/JVN06874657/index.html | third party advisory |