Vulnerability Description
PHPBlogger stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing an admin password hash via a direct request for data/pref.db. NOTE: this can be easily leveraged for administrative access because composing the authentication cookie only requires the password hash, not the cleartext version.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpblogger | Php-Blogger | 2.2.7 |
References
- http://forcehacker.com/forum/viewtopic.php?t=2352
- http://osvdb.org/38706
- http://osvdb.org/38707
- http://secunia.com/advisories/26262
- http://securityreason.com/securityalert/2957
- http://www.securityfocus.com/archive/1/474938/100/0/threaded
- http://forcehacker.com/forum/viewtopic.php?t=2352
- http://osvdb.org/38706
- http://osvdb.org/38707
- http://secunia.com/advisories/26262
- http://securityreason.com/securityalert/2957
- http://www.securityfocus.com/archive/1/474938/100/0/threaded
FAQ
What is CVE-2007-4157?
CVE-2007-4157 is a vulnerability with a CVSS score of 5.0 (MEDIUM). PHPBlogger stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing an admin password hash via a direct request...
How severe is CVE-2007-4157?
CVE-2007-4157 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4157?
Check the references section above for vendor advisories and patch information. Affected products include: Phpblogger Php-Blogger.