10
CVSSv2

CVE-2007-2985

Published: 01/06/2007 Updated: 11/10/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Pheap 2.0 allows remote malicious users to bypass authentication by setting a pheap_login cookie value to the administrator's username, which can be used to (1) obtain sensitive information, including the administrator password, via settings.php or (2) upload and execute arbitrary PHP code via an update_doc action in edit.php.

Vulnerable Product Search on Vulmon Subscribe to Product

pheap pheap 2.0

Exploits

#!/usr/bin/php -q -d short_open_tag=on <?php /* Explanation: The user verification routine used in most of the files is: ##### # # include("lib/configphp"); # if ($_COOKIE['pheap_login'] != $username){ # header("Location: loginphp"); # } else { [CONTINUE EXECUTING CODE] } # ##### So basically it's saying "If the value within the cookie ...