Description
phpRPG 0.8 stores sensitive information under the web root with insufficient access control, which allows remote attackers to read session ID values in files under tmp/, and then hijack sessions via PHPSESSID cookies.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Michael Brooks · textwebappsphp
https://www.exploit-db.com/exploits/30888
References (3)
Core 3
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/27968
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=119774326804168&w=2
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/26884
Scores
EPSS
0.0310
EPSS Percentile
86.9%
Details
CWE
CWE-264
Status
published
Products (1)
phprpg/phprpg
0.8
Published
Dec 20, 2007
Tracked Since
Feb 18, 2026