Search criteria
8 vulnerabilities found for openid by openid
CVE-2008-3280 (GCVE-0-2008-3280)
Vulnerability from nvd – Published: 2021-05-21 19:23 – Updated: 2024-08-07 09:28
VLAI?
Summary
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:28:42.000Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5720"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "openid",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "unknown"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-338",
"description": "CWE-338",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-21T19:23:55",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.exploit-db.com/exploits/5720"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-3280",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "openid",
"version": {
"version_data": [
{
"version_value": "unknown"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-338"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html",
"refsource": "MISC",
"url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
},
{
"name": "https://www.exploit-db.com/exploits/5720",
"refsource": "MISC",
"url": "https://www.exploit-db.com/exploits/5720"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2008-3280",
"datePublished": "2021-05-21T19:23:55",
"dateReserved": "2008-07-24T00:00:00",
"dateUpdated": "2024-08-07T09:28:42.000Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-5173 (GCVE-0-2007-5173)
Vulnerability from nvd – Published: 2007-10-03 14:00 – Updated: 2024-08-07 15:24
VLAI?
Summary
PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:24:41.775Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
},
{
"name": "27001",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27001"
},
{
"name": "37419",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37419"
},
{
"name": "openid-bbstore-file-include(36876)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
},
{
"name": "ADV-2007-3330",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3330"
},
{
"name": "25867",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25867"
},
{
"name": "4471",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/4471"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-09-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
},
{
"name": "27001",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27001"
},
{
"name": "37419",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37419"
},
{
"name": "openid-bbstore-file-include(36876)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
},
{
"name": "ADV-2007-3330",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3330"
},
{
"name": "25867",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25867"
},
{
"name": "4471",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/4471"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5173",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
},
{
"name": "27001",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27001"
},
{
"name": "37419",
"refsource": "OSVDB",
"url": "http://osvdb.org/37419"
},
{
"name": "openid-bbstore-file-include(36876)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
},
{
"name": "ADV-2007-3330",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3330"
},
{
"name": "25867",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25867"
},
{
"name": "4471",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4471"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-5173",
"datePublished": "2007-10-03T14:00:00",
"dateReserved": "2007-10-03T00:00:00",
"dateUpdated": "2024-08-07T15:24:41.775Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1651 (GCVE-0-2007-1651)
Vulnerability from nvd – Published: 2007-03-24 00:00 – Updated: 2024-08-07 13:06
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T13:06:25.983Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43600",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/43600"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2008-11-13T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43600",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/43600"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1651",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"name": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/",
"refsource": "MISC",
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43600",
"refsource": "OSVDB",
"url": "http://osvdb.org/43600"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1651",
"datePublished": "2007-03-24T00:00:00",
"dateReserved": "2007-03-23T00:00:00",
"dateUpdated": "2024-08-07T13:06:25.983Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1652 (GCVE-0-2007-1652)
Vulnerability from nvd – Published: 2007-03-24 00:00 – Updated: 2024-08-07 13:06
VLAI?
Summary
OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user's personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T13:06:26.189Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43601",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/43601"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user\u0027s personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2008-11-13T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43601",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/43601"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1652",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user\u0027s personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"name": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/",
"refsource": "MISC",
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43601",
"refsource": "OSVDB",
"url": "http://osvdb.org/43601"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1652",
"datePublished": "2007-03-24T00:00:00",
"dateReserved": "2007-03-23T00:00:00",
"dateUpdated": "2024-08-07T13:06:26.189Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-3280 (GCVE-0-2008-3280)
Vulnerability from cvelistv5 – Published: 2021-05-21 19:23 – Updated: 2024-08-07 09:28
VLAI?
Summary
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:28:42.000Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5720"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "openid",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "unknown"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-338",
"description": "CWE-338",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-21T19:23:55",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.exploit-db.com/exploits/5720"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-3280",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "openid",
"version": {
"version_data": [
{
"version_value": "unknown"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-338"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html",
"refsource": "MISC",
"url": "http://lists.openid.net/pipermail/openid-security/2008-August/000942.html"
},
{
"name": "https://www.exploit-db.com/exploits/5720",
"refsource": "MISC",
"url": "https://www.exploit-db.com/exploits/5720"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2008-3280",
"datePublished": "2021-05-21T19:23:55",
"dateReserved": "2008-07-24T00:00:00",
"dateUpdated": "2024-08-07T09:28:42.000Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-5173 (GCVE-0-2007-5173)
Vulnerability from cvelistv5 – Published: 2007-10-03 14:00 – Updated: 2024-08-07 15:24
VLAI?
Summary
PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:24:41.775Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
},
{
"name": "27001",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27001"
},
{
"name": "37419",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37419"
},
{
"name": "openid-bbstore-file-include(36876)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
},
{
"name": "ADV-2007-3330",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3330"
},
{
"name": "25867",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25867"
},
{
"name": "4471",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/4471"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-09-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
},
{
"name": "27001",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27001"
},
{
"name": "37419",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37419"
},
{
"name": "openid-bbstore-file-include(36876)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
},
{
"name": "ADV-2007-3330",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3330"
},
{
"name": "25867",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25867"
},
{
"name": "4471",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/4471"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5173",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded"
},
{
"name": "27001",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27001"
},
{
"name": "37419",
"refsource": "OSVDB",
"url": "http://osvdb.org/37419"
},
{
"name": "openid-bbstore-file-include(36876)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876"
},
{
"name": "ADV-2007-3330",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3330"
},
{
"name": "25867",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25867"
},
{
"name": "4471",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4471"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-5173",
"datePublished": "2007-10-03T14:00:00",
"dateReserved": "2007-10-03T00:00:00",
"dateUpdated": "2024-08-07T15:24:41.775Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1651 (GCVE-0-2007-1651)
Vulnerability from cvelistv5 – Published: 2007-03-24 00:00 – Updated: 2024-08-07 13:06
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T13:06:25.983Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43600",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/43600"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2008-11-13T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43600",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/43600"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1651",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"name": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/",
"refsource": "MISC",
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43600",
"refsource": "OSVDB",
"url": "http://osvdb.org/43600"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1651",
"datePublished": "2007-03-24T00:00:00",
"dateReserved": "2007-03-23T00:00:00",
"dateUpdated": "2024-08-07T13:06:25.983Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1652 (GCVE-0-2007-1652)
Vulnerability from cvelistv5 – Published: 2007-03-24 00:00 – Updated: 2024-08-07 13:06
VLAI?
Summary
OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user's personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T13:06:26.189Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43601",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/43601"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user\u0027s personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2008-11-13T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43601",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/43601"
},
{
"name": "[security] 20070321 MyOpenID",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1652",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenID allows remote attackers to forcibly log a user into an OpenID enabled site, divulge the user\u0027s personal information to this site, and add it site to the trusted sites list via a crafted web page, related to cached tokens."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000286.html"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000288.html"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000306.html"
},
{
"name": "[security] 20070322 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000311.html"
},
{
"name": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/",
"refsource": "MISC",
"url": "http://janrain.com/blog/2007/03/22/myopenid-security-fix/"
},
{
"name": "43601",
"refsource": "OSVDB",
"url": "http://osvdb.org/43601"
},
{
"name": "[security] 20070321 MyOpenID",
"refsource": "MLIST",
"url": "http://openid.net/pipermail/security/2007-March/000291.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1652",
"datePublished": "2007-03-24T00:00:00",
"dateReserved": "2007-03-23T00:00:00",
"dateUpdated": "2024-08-07T13:06:26.189Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}