PHProjekt before 2.4a allows remote attackers to perform actions as other PHProjekt users by modifying the ID number in an HTTP request to PHProjekt CGI programs.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Phpprojekt | Phpprojekt | * | 2.4a (including) |
| Phpprojekt | Phpprojekt | 2.0 (including) | 2.0 (including) |
| Phpprojekt | Phpprojekt | 2.0.1 (including) | 2.0.1 (including) |
| Phpprojekt | Phpprojekt | 2.1 (including) | 2.1 (including) |
| Phpprojekt | Phpprojekt | 2.1a (including) | 2.1a (including) |
| Phpprojekt | Phpprojekt | 2.2 (including) | 2.2 (including) |
| Phpprojekt | Phpprojekt | 2.3 (including) | 2.3 (including) |