Description
Gallarific does not require authentication for (1) users.php and (2) index.php, which allows remote attackers to add and edit tasks via a direct request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Exploits (1)
References (6)
Core 6
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/28163
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41106
Exploit x_refsource_misc
http://downloads.securityfocus.com/vulnerabilities/exploits/28163.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29399
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3%40%3Cissues.struts.apache.org%3E
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db%40%3Cissues.struts.apache.org%3E
Scores
EPSS
0.0458
EPSS Percentile
89.3%
Details
CWE
CWE-287
Status
published
Products (1)
gallarific/gallarific
Published
Mar 13, 2008
Tracked Since
Feb 18, 2026