Vulnerability Description
ext_find_user in eXtplorer through 2.1.2 allows remote attackers to bypass authentication via a password[]= (aka an empty array) in an action=login request to index.php.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Extplorer | Extplorer | <= 2.1.2 |
Related Weaknesses (CWE)
References
- http://itsecuritysolutions.org/2012-12-31-eXtplorer-v2.1-authentication-bypass-vExploitThird Party Advisory
- http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201212-371Third Party Advisory
- https://www.securityfocus.com/bid/57058Third Party AdvisoryVDB Entry
- http://itsecuritysolutions.org/2012-12-31-eXtplorer-v2.1-authentication-bypass-vExploitThird Party Advisory
- http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201212-371Third Party Advisory
- https://www.securityfocus.com/bid/57058Third Party AdvisoryVDB Entry
FAQ
What is CVE-2012-6710?
CVE-2012-6710 is a vulnerability with a CVSS score of 9.8 (CRITICAL). ext_find_user in eXtplorer through 2.1.2 allows remote attackers to bypass authentication via a password[]= (aka an empty array) in an action=login request to index.php.
How severe is CVE-2012-6710?
CVE-2012-6710 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2012-6710?
Check the references section above for vendor advisories and patch information. Affected products include: Extplorer Extplorer.