Description
TutorialCMS 1.01 and earlier, when register_globals is enabled, allows remote attackers to bypass authentication via the (1) loggedIn and (2) activated parameters to (a) login.php, (b) headerLinks.php, (c) submit1.php, (d) myFav.php, and (e) userCP.php.
Exploits (1)
References (6)
Core 6
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/25358
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/3963
Various Sources x_refsource_confirm
http://www.wavelinkmedia.com/scripts/tutorialcms/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/36520
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/34401
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/1903
Scores
EPSS
0.1449
EPSS Percentile
94.5%
Details
Status
published
Products (1)
wavelink_media/tutorialcms
< 1.01
Published
May 22, 2007
Tracked Since
Feb 18, 2026