CVE-2008-1506 – PEEL CMS 3.x - Admin Hash Extraction / Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2008-1506
PEEL, possibly 3.x and earlier, allows remote attackers to obtain configuration information via a direct request to phpinfo.php, which calls the phpinfo function. PEEL, posiblemente 3.x y versiones anteriores, permite a atacantes remotos obtener información de configuración mediante una petición directa a phpinfo.php, que realiza una llamada a la función phpinfo. • https://www.exploit-db.com/exploits/5281 http://realn.free.fr/releases/70207 https://exchange.xforce.ibmcloud.com/vulnerabilities/41494 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2008-1507 – PEEL CMS 3.x - Admin Hash Extraction / Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2008-1507
PEEL, possibly 3.x and earlier, has (1) a default info@peel.fr account with password admin, and (2) a default contact@peel.fr account with password cinema, which allows remote attackers to gain administrative access. PEEL, posiblemente 3.x y versiones anteriores, tiene (1) una cuenta por defecto info@peel.fr con contraseña admin y (2) una cuenta por defecto contact@peel.fr con contraseña cinema, que permite a atacantes remotos conseguir acceso administrativo. • https://www.exploit-db.com/exploits/5281 http://realn.free.fr/releases/70207 https://exchange.xforce.ibmcloud.com/vulnerabilities/41493 • CWE-16: Configuration •
CVE-2008-1495 – PEEL CMS 3.x - Admin Hash Extraction / Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2008-1495
Unrestricted file upload vulnerability in administrer/produits.php in PEEL, possibly 3.x and earlier, allows remote authenticated administrators to upload and execute arbitrary PHP files via a modified content type in an ajout action, as demonstrated by (1) image/gif and (2) application/pdf. Vulnerabilidad de subida de ficheros no restringidos en administrer/produits.php de PEEL, posiblemente versión 3.x y anteriores, permite a administradores remotos autenticados subir y ejecutar archivos PHP de su elección mediante un tipo de contenido modificado en una acción ajout, tal y como se ha demostrado con (1) image/gif y (2) application/pdf. • https://www.exploit-db.com/exploits/5281 http://realn.free.fr/releases/70207 http://secunia.com/advisories/29466 http://www.securityfocus.com/bid/28346 https://exchange.xforce.ibmcloud.com/vulnerabilities/41354 • CWE-20: Improper Input Validation •
CVE-2008-1496 – PEEL CMS 3.x - Admin Hash Extraction / Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2008-1496
Multiple SQL injection vulnerabilities in PEEL, possibly 3.x and earlier, allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to (a) membre.php, and the (2) timestamp parameter to (b) the details action in achat/historique_commandes.php and (c) the facture action in factures/facture_html.php. Múltiples vulnerabilidades de Inyección SQL en PEEL, posiblemente versión 3.x y anteriores, permite a atacantes remotos ejecutar comandos SQL de su elección mediante el (1) parámetro email en (a) membre.php y el (2) parámetro timestamp en (b) la acción details en achat/historique_commandes.php y (c) la acción facture en factures/facture_html.php. • https://www.exploit-db.com/exploits/5281 http://realn.free.fr/releases/70207 http://secunia.com/advisories/29466 http://www.securityfocus.com/bid/28346 https://exchange.xforce.ibmcloud.com/vulnerabilities/41341 https://exchange.xforce.ibmcloud.com/vulnerabilities/41353 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2002-2134 – PEEL 1.0b - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2002-2134
haut.php in PEEL 1.0b allows remote attackers to execute arbitrary PHP code by modifying the dirroot parameter to reference a URL on a remote web server that contains the code in a lang.php file. • https://www.exploit-db.com/exploits/22114 http://secunia.com/advisories/7797 http://www.iss.net/security_center/static/10960.php http://www.securityfocus.com/archive/1/304779 http://www.securityfocus.com/bid/6496 http://www.securitytracker.com/id?1005869 •