Required CVE Record Information
Description
connection.php in FlashChat 5.0.8 allows remote attackers to bypass the role filter mechanism and gain administrative privileges by setting the s parameter to "7."
References 6 Total
- exchange.xforce.ibmcloud.com: flashchat-connection-security-bypass(45974) vdb-entry
- osvdb.org: 49337 vdb-entry
- securityfocus.com: 31800 vdb-entry
- secunia.com: 32350 third-party-advisory
- marc.info: 20081017 flashchat severe bug mailing-list
- http://packetstorm.linuxsecurity.com/0810-exploits/flashchat-bypass.txt
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 6 Total
- exchange.xforce.ibmcloud.com: flashchat-connection-security-bypass(45974) vdb-entryx_transferred
- osvdb.org: 49337 vdb-entryx_transferred
- securityfocus.com: 31800 vdb-entryx_transferred
- secunia.com: 32350 third-party-advisoryx_transferred
- marc.info: 20081017 flashchat severe bug mailing-listx_transferred
- http://packetstorm.linuxsecurity.com/0810-exploits/flashchat-bypass.txt x_transferred