CVE-2008-7024

Arzdev Gemini Lite - Access Control

Title source: rule
STIX 2.1

Description

admin.php in Arz Development The Gemini Portal 4.7 and earlier allows remote attackers to bypass authentication and gain administrator privileges by setting the user cookie to "admin" and setting the name parameter to "users."

Exploits (1)

exploitdb WORKING POC VERIFIED
by Pepelux · textwebappsphp
https://www.exploit-db.com/exploits/6584

References (6)

Core 6
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/31429
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/45439
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/6584
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32057
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/496761/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/48639

Scores

EPSS 0.0265
EPSS Percentile 85.8%

Details

CWE
CWE-264
Status published
Products (3)
arzdev/gemini_lite 3.5
arzdev/gemini_lite 3.6
arzdev/gemini_portal 4.7
Published Aug 21, 2009
Tracked Since Feb 18, 2026