Search criteria

2 vulnerabilities by netoffice

CVE-2008-2044 (GCVE-0-2008-2044)

Vulnerability from cvelistv5 – Published: 2008-05-01 17:20 – Updated: 2024-08-07 08:49
VLAI?
Summary
includes/library.php in netOffice Dwins 1.3 p2 compares the demoSession variable to the 'true' string literal instead of the true boolean literal, which allows remote attackers to bypass authentication and execute arbitrary code by setting this variable to 1, as demonstrated by uploading a PHP script via an add action to projects_site/uploadfile.php.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/29193 third-party-advisoryx_refsource_SECUNIA
http://sourceforge.net/forum/forum.php?forum_id=814851 x_refsource_MISC
http://www.securityfocus.com/archive/1/488958 mailing-listx_refsource_BUGTRAQ
http://securityreason.com/securityalert/3845 third-party-advisoryx_refsource_SREASON
http://netofficedwins.sourceforge.net/modules/new… x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/491542/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/28051 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:49:56.920Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "29193",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29193"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/forum/forum.php?forum_id=814851"
          },
          {
            "name": "20080229 netOffice Dwins 1.3 Remote code execution.",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/488958"
          },
          {
            "name": "3845",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3845"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47"
          },
          {
            "name": "20080502 Re: netOffice Dwins 1.3 Remote code execution.",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/491542/100/0/threaded"
          },
          {
            "name": "28051",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28051"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "includes/library.php in netOffice Dwins 1.3 p2 compares the demoSession variable to the \u0027true\u0027 string literal instead of the true boolean literal, which allows remote attackers to bypass authentication and execute arbitrary code by setting this variable to 1, as demonstrated by uploading a PHP script via an add action to projects_site/uploadfile.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "29193",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29193"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://sourceforge.net/forum/forum.php?forum_id=814851"
        },
        {
          "name": "20080229 netOffice Dwins 1.3 Remote code execution.",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/488958"
        },
        {
          "name": "3845",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3845"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47"
        },
        {
          "name": "20080502 Re: netOffice Dwins 1.3 Remote code execution.",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/491542/100/0/threaded"
        },
        {
          "name": "28051",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28051"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2044",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "includes/library.php in netOffice Dwins 1.3 p2 compares the demoSession variable to the \u0027true\u0027 string literal instead of the true boolean literal, which allows remote attackers to bypass authentication and execute arbitrary code by setting this variable to 1, as demonstrated by uploading a PHP script via an add action to projects_site/uploadfile.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "29193",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29193"
            },
            {
              "name": "http://sourceforge.net/forum/forum.php?forum_id=814851",
              "refsource": "MISC",
              "url": "http://sourceforge.net/forum/forum.php?forum_id=814851"
            },
            {
              "name": "20080229 netOffice Dwins 1.3 Remote code execution.",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/488958"
            },
            {
              "name": "3845",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3845"
            },
            {
              "name": "http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47",
              "refsource": "CONFIRM",
              "url": "http://netofficedwins.sourceforge.net/modules/news/article.php?storyid=47"
            },
            {
              "name": "20080502 Re: netOffice Dwins 1.3 Remote code execution.",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/491542/100/0/threaded"
            },
            {
              "name": "28051",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28051"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2044",
    "datePublished": "2008-05-01T17:20:00",
    "dateReserved": "2008-05-01T00:00:00",
    "dateUpdated": "2024-08-07T08:49:56.920Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1495 (GCVE-0-2006-1495)

Vulnerability from cvelistv5 – Published: 2006-03-30 00:00 – Updated: 2024-08-07 17:12
VLAI?
Summary
SQL injection vulnerability in general/sendpassword.php in (1) PHPCollab 2.4 and 2.5.rc3, and (2) NetOffice 2.5.3-pl1 and 2.6.0b2 allows remote attackers to execute arbitrary SQL commands via the loginForm parameter in the "forgotten password" option.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/19449 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/1141 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/17286 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
https://www.exploit-db.com/exploits/1617 exploitx_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://downloads.securityfocus.com/vulnerabilitie… x_refsource_MISC
http://secunia.com/advisories/19452 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/1142 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/24230 vdb-entryx_refsource_OSVDB
http://security.gentoo.org/glsa/glsa-200812-20.xml vendor-advisoryx_refsource_GENTOO
http://www.osvdb.org/24226 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/17283 vdb-entryx_refsource_BID
http://secunia.com/advisories/33258 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:12:22.113Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19449",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19449"
          },
          {
            "name": "ADV-2006-1141",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1141"
          },
          {
            "name": "17286",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17286"
          },
          {
            "name": "phpcollab-sendpassword-sql-injection(25505)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25505"
          },
          {
            "name": "1617",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/1617"
          },
          {
            "name": "netoffice-sendpassword-sql-injection(25503)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25503"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/PHPCollab_NetOffice_SQLINJ.php"
          },
          {
            "name": "19452",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19452"
          },
          {
            "name": "ADV-2006-1142",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1142"
          },
          {
            "name": "24230",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/24230"
          },
          {
            "name": "GLSA-200812-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200812-20.xml"
          },
          {
            "name": "24226",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/24226"
          },
          {
            "name": "17283",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17283"
          },
          {
            "name": "33258",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33258"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in general/sendpassword.php in (1) PHPCollab 2.4 and 2.5.rc3, and (2) NetOffice 2.5.3-pl1 and 2.6.0b2 allows remote attackers to execute arbitrary SQL commands via the loginForm parameter in the \"forgotten password\" option."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19449",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19449"
        },
        {
          "name": "ADV-2006-1141",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1141"
        },
        {
          "name": "17286",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17286"
        },
        {
          "name": "phpcollab-sendpassword-sql-injection(25505)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25505"
        },
        {
          "name": "1617",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/1617"
        },
        {
          "name": "netoffice-sendpassword-sql-injection(25503)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25503"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/PHPCollab_NetOffice_SQLINJ.php"
        },
        {
          "name": "19452",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19452"
        },
        {
          "name": "ADV-2006-1142",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1142"
        },
        {
          "name": "24230",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/24230"
        },
        {
          "name": "GLSA-200812-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200812-20.xml"
        },
        {
          "name": "24226",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/24226"
        },
        {
          "name": "17283",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17283"
        },
        {
          "name": "33258",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33258"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1495",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in general/sendpassword.php in (1) PHPCollab 2.4 and 2.5.rc3, and (2) NetOffice 2.5.3-pl1 and 2.6.0b2 allows remote attackers to execute arbitrary SQL commands via the loginForm parameter in the \"forgotten password\" option."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19449",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19449"
            },
            {
              "name": "ADV-2006-1141",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1141"
            },
            {
              "name": "17286",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17286"
            },
            {
              "name": "phpcollab-sendpassword-sql-injection(25505)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25505"
            },
            {
              "name": "1617",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/1617"
            },
            {
              "name": "netoffice-sendpassword-sql-injection(25503)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25503"
            },
            {
              "name": "http://downloads.securityfocus.com/vulnerabilities/exploits/PHPCollab_NetOffice_SQLINJ.php",
              "refsource": "MISC",
              "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/PHPCollab_NetOffice_SQLINJ.php"
            },
            {
              "name": "19452",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19452"
            },
            {
              "name": "ADV-2006-1142",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1142"
            },
            {
              "name": "24230",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/24230"
            },
            {
              "name": "GLSA-200812-20",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200812-20.xml"
            },
            {
              "name": "24226",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/24226"
            },
            {
              "name": "17283",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17283"
            },
            {
              "name": "33258",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33258"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1495",
    "datePublished": "2006-03-30T00:00:00",
    "dateReserved": "2006-03-29T00:00:00",
    "dateUpdated": "2024-08-07T17:12:22.113Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}