Search criteria

8 vulnerabilities found for openid by openid

CVE-2008-3280 (GCVE-0-2008-3280)

Vulnerability from nvd – Published: 2021-05-21 19:23 – Updated: 2024-08-07 09:28
VLAI?
Summary
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
n/a openid Affected: unknown
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:28:42.000Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5720"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "openid",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "unknown"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-338",
              "description": "CWE-338",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-21T19:23:55",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.exploit-db.com/exploits/5720"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-3280",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "openid",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "unknown"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-338"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html",
              "refsource": "MISC",
              "url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
            },
            {
              "name": "https://www.exploit-db.com/exploits/5720",
              "refsource": "MISC",
              "url": "https://www.exploit-db.com/exploits/5720"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-3280",
    "datePublished": "2021-05-21T19:23:55",
    "dateReserved": "2008-07-24T00:00:00",
    "dateUpdated": "2024-08-07T09:28:42.000Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-5173 (GCVE-0-2007-5173)

Vulnerability from nvd – Published: 2007-10-03 14:00 – Updated: 2024-08-07 15:24
VLAI?
Summary
PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/481215/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/27001 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/37419 vdb-entryx_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2007/3330 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/25867 vdb-entryx_refsource_BID
https://www.exploit-db.com/exploits/4471 exploitx_refsource_EXPLOIT-DB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:24:41.775Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
          },
          {
            "name": "27001",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27001"
          },
          {
            "name": "37419",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37419"
          },
          {
            "name": "openid-bbstore-file-include(36876)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
          },
          {
            "name": "ADV-2007-3330",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3330"
          },
          {
            "name": "25867",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25867"
          },
          {
            "name": "4471",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/4471"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-09-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
        },
        {
          "name": "27001",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27001"
        },
        {
          "name": "37419",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37419"
        },
        {
          "name": "openid-bbstore-file-include(36876)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
        },
        {
          "name": "ADV-2007-3330",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3330"
        },
        {
          "name": "25867",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25867"
        },
        {
          "name": "4471",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/4471"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-5173",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
            },
            {
              "name": "27001",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27001"
            },
            {
              "name": "37419",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37419"
            },
            {
              "name": "openid-bbstore-file-include(36876)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
            },
            {
              "name": "ADV-2007-3330",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3330"
            },
            {
              "name": "25867",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25867"
            },
            {
              "name": "4471",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/4471"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-5173",
    "datePublished": "2007-10-03T14:00:00",
    "dateReserved": "2007-10-03T00:00:00",
    "dateUpdated": "2024-08-07T15:24:41.775Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1651 (GCVE-0-2007-1651)

Vulnerability from nvd – Published: 2007-03-24 00:00 – Updated: 2024-08-07 13:06
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:06:25.983Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000286.html"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000288.html"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000306.html"
          },
          {
            "name": "[security] 20070322 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000311.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
          },
          {
            "name": "43600",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/43600"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000291.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-13T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000286.html"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000288.html"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000306.html"
        },
        {
          "name": "[security] 20070322 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000311.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
        },
        {
          "name": "43600",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/43600"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000291.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1651",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000286.html"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000288.html"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000306.html"
            },
            {
              "name": "[security] 20070322 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000311.html"
            },
            {
              "name": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/",
              "refsource": "MISC",
              "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
            },
            {
              "name": "43600",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/43600"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000291.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1651",
    "datePublished": "2007-03-24T00:00:00",
    "dateReserved": "2007-03-23T00:00:00",
    "dateUpdated": "2024-08-07T13:06:25.983Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1652 (GCVE-0-2007-1652)

Vulnerability from nvd – Published: 2007-03-24 00:00 – Updated: 2024-08-07 13:06
VLAI?
Summary
OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user's personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:06:26.189Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000286.html"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000288.html"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000306.html"
          },
          {
            "name": "[security] 20070322 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000311.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
          },
          {
            "name": "43601",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/43601"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000291.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user\u0027s personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-13T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000286.html"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000288.html"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000306.html"
        },
        {
          "name": "[security] 20070322 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000311.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
        },
        {
          "name": "43601",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/43601"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000291.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1652",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user\u0027s personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000286.html"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000288.html"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000306.html"
            },
            {
              "name": "[security] 20070322 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000311.html"
            },
            {
              "name": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/",
              "refsource": "MISC",
              "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
            },
            {
              "name": "43601",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/43601"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000291.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1652",
    "datePublished": "2007-03-24T00:00:00",
    "dateReserved": "2007-03-23T00:00:00",
    "dateUpdated": "2024-08-07T13:06:26.189Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-3280 (GCVE-0-2008-3280)

Vulnerability from cvelistv5 – Published: 2021-05-21 19:23 – Updated: 2024-08-07 09:28
VLAI?
Summary
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
n/a openid Affected: unknown
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:28:42.000Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5720"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "openid",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "unknown"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-338",
              "description": "CWE-338",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-21T19:23:55",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.exploit-db.com/exploits/5720"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-3280",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "openid",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "unknown"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-338"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html",
              "refsource": "MISC",
              "url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
            },
            {
              "name": "https://www.exploit-db.com/exploits/5720",
              "refsource": "MISC",
              "url": "https://www.exploit-db.com/exploits/5720"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-3280",
    "datePublished": "2021-05-21T19:23:55",
    "dateReserved": "2008-07-24T00:00:00",
    "dateUpdated": "2024-08-07T09:28:42.000Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-5173 (GCVE-0-2007-5173)

Vulnerability from cvelistv5 – Published: 2007-10-03 14:00 – Updated: 2024-08-07 15:24
VLAI?
Summary
PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/481215/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/27001 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/37419 vdb-entryx_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2007/3330 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/25867 vdb-entryx_refsource_BID
https://www.exploit-db.com/exploits/4471 exploitx_refsource_EXPLOIT-DB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:24:41.775Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
          },
          {
            "name": "27001",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27001"
          },
          {
            "name": "37419",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37419"
          },
          {
            "name": "openid-bbstore-file-include(36876)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
          },
          {
            "name": "ADV-2007-3330",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3330"
          },
          {
            "name": "25867",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25867"
          },
          {
            "name": "4471",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/4471"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-09-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
        },
        {
          "name": "27001",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27001"
        },
        {
          "name": "37419",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37419"
        },
        {
          "name": "openid-bbstore-file-include(36876)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
        },
        {
          "name": "ADV-2007-3330",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3330"
        },
        {
          "name": "25867",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25867"
        },
        {
          "name": "4471",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/4471"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-5173",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
            },
            {
              "name": "27001",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27001"
            },
            {
              "name": "37419",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37419"
            },
            {
              "name": "openid-bbstore-file-include(36876)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
            },
            {
              "name": "ADV-2007-3330",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3330"
            },
            {
              "name": "25867",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25867"
            },
            {
              "name": "4471",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/4471"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-5173",
    "datePublished": "2007-10-03T14:00:00",
    "dateReserved": "2007-10-03T00:00:00",
    "dateUpdated": "2024-08-07T15:24:41.775Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1651 (GCVE-0-2007-1651)

Vulnerability from cvelistv5 – Published: 2007-03-24 00:00 – Updated: 2024-08-07 13:06
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:06:25.983Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000286.html"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000288.html"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000306.html"
          },
          {
            "name": "[security] 20070322 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000311.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
          },
          {
            "name": "43600",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/43600"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000291.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-13T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000286.html"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000288.html"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000306.html"
        },
        {
          "name": "[security] 20070322 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000311.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
        },
        {
          "name": "43600",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/43600"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000291.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1651",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000286.html"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000288.html"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000306.html"
            },
            {
              "name": "[security] 20070322 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000311.html"
            },
            {
              "name": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/",
              "refsource": "MISC",
              "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
            },
            {
              "name": "43600",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/43600"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000291.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1651",
    "datePublished": "2007-03-24T00:00:00",
    "dateReserved": "2007-03-23T00:00:00",
    "dateUpdated": "2024-08-07T13:06:25.983Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1652 (GCVE-0-2007-1652)

Vulnerability from cvelistv5 – Published: 2007-03-24 00:00 – Updated: 2024-08-07 13:06
VLAI?
Summary
OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user's personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:06:26.189Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000286.html"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000288.html"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000306.html"
          },
          {
            "name": "[security] 20070322 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000311.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
          },
          {
            "name": "43601",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/43601"
          },
          {
            "name": "[security] 20070321 MyOpenID",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openid.net/pipermail/security/2007-March/000291.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user\u0027s personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-13T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000286.html"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000288.html"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000306.html"
        },
        {
          "name": "[security] 20070322 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000311.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
        },
        {
          "name": "43601",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/43601"
        },
        {
          "name": "[security] 20070321 MyOpenID",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openid.net/pipermail/security/2007-March/000291.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1652",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user\u0027s personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000286.html"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000288.html"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000306.html"
            },
            {
              "name": "[security] 20070322 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000311.html"
            },
            {
              "name": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/",
              "refsource": "MISC",
              "url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
            },
            {
              "name": "43601",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/43601"
            },
            {
              "name": "[security] 20070321 MyOpenID",
              "refsource": "MLIST",
              "url": "http://openid.net/pipermail/security/2007-March/000291.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1652",
    "datePublished": "2007-03-24T00:00:00",
    "dateReserved": "2007-03-23T00:00:00",
    "dateUpdated": "2024-08-07T13:06:26.189Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}