Vulnerability Description
login.php in Zenas PaoBacheca Guestbook 2.1, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative access by setting the login_ok parameter to 1.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zenas | Pao-Bacheca Guestbook | 2.1 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/36023Broken LinkVendor Advisory
- http://www.exploit-db.com/exploits/9293Third Party AdvisoryVDB Entry
- http://www.osvdb.org/56757Broken LinkExploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52100Third Party AdvisoryVDB Entry
- http://secunia.com/advisories/36023Broken LinkVendor Advisory
- http://www.exploit-db.com/exploits/9293Third Party AdvisoryVDB Entry
- http://www.osvdb.org/56757Broken LinkExploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52100Third Party AdvisoryVDB Entry
FAQ
What is CVE-2009-3421?
CVE-2009-3421 is a vulnerability with a CVSS score of 9.8 (CRITICAL). login.php in Zenas PaoBacheca Guestbook 2.1, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative access by setting the login_ok parameter to 1.
How severe is CVE-2009-3421?
CVE-2009-3421 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2009-3421?
Check the references section above for vendor advisories and patch information. Affected products include: Zenas Pao-Bacheca Guestbook.