A Security Bypass vulnerability exists in the activate.asp page in Arial Software Campaign Enterprise 11.0.551, which could let a remote malicious user modify the SerialNumber field.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
http://sadgeeksinsnow.blogspot.dk/2012/10/my-first-experiences-bug-hunting-part-2.html | third party advisory exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79508 | vdb entry third party advisory |
http://archives.neohapsis.com/archives/bugtraq/2012-10/0103.html | broken link |
https://www.securityfocus.com/archive/1/524462 | exploit vdb entry third party advisory |
https://www.securityfocus.com/bid/56117/info | vdb entry third party advisory |