Vulnerability Description
Eventum before 2.3.5 allows remote attackers to reinstall the application via direct request to /setup/index.php.
CVSS Score
7.5
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eventum Project | Eventum | < 2.3.5 |
Related Weaknesses (CWE)
References
- http://bazaar.launchpad.net/~eventum-developers/eventum/trunk/revision/4666PatchThird Party Advisory
- http://www.securityfocus.com/archive/1/530891/100/0/threadedExploitThird Party AdvisoryVDB Entry
- https://bugs.launchpad.net/eventum/+bug/1271499ExploitIssue TrackingThird Party Advisory
- https://www.htbridge.com/advisory/HTB23198ExploitThird Party Advisory
- http://bazaar.launchpad.net/~eventum-developers/eventum/trunk/revision/4666PatchThird Party Advisory
- http://www.securityfocus.com/archive/1/530891/100/0/threadedExploitThird Party AdvisoryVDB Entry
- https://bugs.launchpad.net/eventum/+bug/1271499ExploitIssue TrackingThird Party Advisory
- https://www.htbridge.com/advisory/HTB23198ExploitThird Party Advisory
FAQ
What is CVE-2014-1631?
CVE-2014-1631 is a vulnerability with a CVSS score of 7.5 (HIGH). Eventum before 2.3.5 allows remote attackers to reinstall the application via direct request to /setup/index.php.
How severe is CVE-2014-1631?
CVE-2014-1631 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1631?
Check the references section above for vendor advisories and patch information. Affected products include: Eventum Project Eventum.