Vulnerability Description
confirm.php in ATutor 2.2 and earlier allows remote attackers to bypass authentication and gain access as an existing user via the auto_login parameter.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atutor | Atutor | <= 2.2 |
Related Weaknesses (CWE)
References
- http://karmainsecurity.com/KIS-2015-06ExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2015/Nov/11ExploitMailing ListThird Party Advisory
- http://update.atutor.ca/patch/2_2/2_2-6/patch.xmlBroken Link
- http://www.securityfocus.com/archive/1/archive/1/536835/100/0/threadedBroken Link
- https://github.com/atutor/ATutor/commit/950a0299954e69b8742cc1f1a632f564435d4d7dPatchThird Party Advisory
- http://karmainsecurity.com/KIS-2015-06ExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2015/Nov/11ExploitMailing ListThird Party Advisory
- http://update.atutor.ca/patch/2_2/2_2-6/patch.xmlBroken Link
- http://www.securityfocus.com/archive/1/archive/1/536835/100/0/threadedBroken Link
- https://github.com/atutor/ATutor/commit/950a0299954e69b8742cc1f1a632f564435d4d7dPatchThird Party Advisory
FAQ
What is CVE-2014-9753?
CVE-2014-9753 is a vulnerability with a CVSS score of 9.8 (CRITICAL). confirm.php in ATutor 2.2 and earlier allows remote attackers to bypass authentication and gain access as an existing user via the auto_login parameter.
How severe is CVE-2014-9753?
CVE-2014-9753 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2014-9753?
Check the references section above for vendor advisories and patch information. Affected products include: Atutor Atutor.