10
CVSSv2

CVE-2007-2372

Published: 30/04/2007 Updated: 11/10/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

admin/send_mod.php in Gregory Kokanosky phpMyNewsletter 0.8 beta5 and previous versions prints a Location header but does not exit when administrative credentials are missing, which allows remote malicious users to compose an e-mail message via a post with the subject, message, format, and list_id fields; and send the message via a direct request for the MsgId value under admin/.

Vulnerable Product Search on Vulmon Subscribe to Product

gregory kokanosky phpmynewsletter

Exploits

#!/usr/bin/php -q -d short_open_tag=on <? echo " phpMyNewsletter <= 08 (beta5) Multiple Vuln Exploit by BlackHawk <hawkgotyou@gmailcom> <itablackhawkaltervistaorg> Thanks to rgod for the php code and Marty for the Love "; if ($argc<3) { echo "Usage: php "$argv[0]" Site AttackType Related Host: target serv ...