Vulnerability Details : CVE-2002-1757
Potential exploit
PHProjekt 2.0 through 3.1 relies on the $PHP_SELF variable for authentication, which allows remote attackers to bypass authentication for scripts via a request to a .php file with "sms" in the URL, which is included in the PATH_INFO portion of the $PHP_SELF variable, as demonstrated using "mail_send.php/sms".
Products affected by CVE-2002-1757
- cpe:2.3:a:phprojekt:phprojekt:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:phprojekt:phprojekt:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:phprojekt:phprojekt:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:phprojekt:phprojekt:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:phprojekt:phprojekt:3.1a:*:*:*:*:*:*:*
- cpe:2.3:a:phprojekt:phprojekt:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:phprojekt:phprojekt:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:phprojekt:phprojekt:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:phprojekt:phprojekt:2.4a:*:*:*:*:*:*:*
- cpe:2.3:a:phprojekt:phprojekt:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:phprojekt:phprojekt:2.1a:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-1757
2.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1757
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2002-1757
Jump to