First published: Wed Feb 21 2007(Updated: )
Ezboo webstats, possibly 3.0.3, allows remote attackers to bypass authentication and gain access via a direct request to (1) update.php and (2) config.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | =10.4.9 | |
HPE HP-UX | ||
HP Tru64 UNIX | =5.1b_pk2_bl22 | |
IBM AIX | ||
IBM OS/2 | ||
Linux Kernel | ||
Microsoft Windows 2000 | ||
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows 95 | ||
Microsoft Windows 98 | =gold | |
Microsoft Windows 98SE | ||
Microsoft Windows Me | ||
Microsoft Windows NT | =4.0 | |
Microsoft Windows XP | =gold | |
santa cruz operation sco unix | ||
Oracle Solaris SPARC | ||
windriver bsdos | ||
Ezboo webstats | =3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1043 is considered a critical vulnerability as it allows remote attackers to bypass authentication and access sensitive files.
To fix CVE-2007-1043, update to the latest version of Ezboo webstats to ensure that authentication bypass vulnerabilities are patched.
The vulnerability CVE-2007-1043 specifically affects Ezboo webstats version 3.0.3.
Yes, exploitation of CVE-2007-1043 can lead to unauthorized access to sensitive configuration and update files, potentially resulting in data loss.
While CVE-2007-1043 is an older vulnerability, systems running the affected version of Ezboo webstats that have not been updated remain at risk.