SurgeLDAP 1.0g (Build 12), and possibly other versions before 1.0h, allows remote attackers to bypass authentication for the administration interface via a direct request to admin.cgi with a modified utoken parameter.
References
Link | Resource |
---|---|
http://netwinsite.com/surgeldap/updates.htm | Patch |
http://www.securityfocus.com/bid/10294 | Exploit |
http://www.osvdb.org/5890 | Exploit Patch |
http://securitytracker.com/id?1010068 | Exploit |
http://securitytracker.com/alerts/2004/May/1010113.html | Exploit Patch |
http://secunia.com/advisories/11549 | Exploit Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16076 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2004-12-30 21:00
Updated : 2017-07-10 18:31
NVD link : CVE-2004-2254
Mitre link : CVE-2004-2254
JSON object : View
CWE
Products Affected
netwin
- surgeldap