PHProjekt before 2.4a allows remote attackers to perform actions as other PHProjekt users by modifying the ID number in an HTTP request to PHProjekt CGI programs.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Phpprojekt | Phpprojekt | * | 2.4a (including) |
Phpprojekt | Phpprojekt | 2.0 (including) | 2.0 (including) |
Phpprojekt | Phpprojekt | 2.0.1 (including) | 2.0.1 (including) |
Phpprojekt | Phpprojekt | 2.1 (including) | 2.1 (including) |
Phpprojekt | Phpprojekt | 2.1a (including) | 2.1a (including) |
Phpprojekt | Phpprojekt | 2.2 (including) | 2.2 (including) |
Phpprojekt | Phpprojekt | 2.3 (including) | 2.3 (including) |