CVE-2010-4279

Artica Pandora Fms < 3.1 - Authentication Bypass

Title source: rule
STIX 2.1

Description

The default configuration of Pandora FMS 3.1 and earlier specifies an empty string for the loginhash_pwd field, which allows remote attackers to bypass authentication by sending a request to index.php with "admin" in the loginhash_user parameter, in conjunction with the md5 hash of "admin" in the loginhash_data parameter.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/35731
exploitdb WRITEUP VERIFIED
by Juan Galiana Lara · textwebappsphp
https://www.exploit-db.com/exploits/15639
metasploit WORKING POC EXCELLENT
by Juan Galiana Lara · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/pandora_upload_exec.rb

References (9)

Core 9
Core References
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/42347
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/514939/100/0/threaded
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/35731/
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/45112
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/15639
Mailing List mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2010/Nov/326
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/69549

Scores

EPSS 0.8175
EPSS Percentile 99.2%

Details

CWE
CWE-287
Status published
Products (9)
artica/pandora_fms 1.2
artica/pandora_fms 1.3 (5 CPE variants)
artica/pandora_fms 1.3.1
artica/pandora_fms 2.0 (2 CPE variants)
artica/pandora_fms 2.1
artica/pandora_fms 2.1.1
artica/pandora_fms 3.0 (3 CPE variants)
artica/pandora_fms 3.1 rc1
artica/pandora_fms < 3.1
Published Dec 02, 2010
Tracked Since Feb 18, 2026