Vulnerability Details : CVE-2008-1327
Gallarific does not require authentication for (1) users.php and (2) index.php, which allows remote attackers to add and edit tasks via a direct request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Vulnerability category: BypassGain privilege
Products affected by CVE-2008-1327
- cpe:2.3:a:gallarific:gallarific:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1327
7.00%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1327
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-1327
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1327
-
http://downloads.securityfocus.com/vulnerabilities/exploits/28163.html
Exploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41106
-
https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3@%3Cissues.struts.apache.org%3E
-
https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db@%3Cissues.struts.apache.org%3E
-
http://www.securityfocus.com/bid/28163
Exploit
Jump to