CVE DATABASE / CVE-2002-1757
CVE-2002-1757
CVSS 7.5 · HIGH
Summary
PHProjekt 2.0 through 3.1 relies on the $PHP_SELF variable for authentication, which allows remote attackers to bypass authentication for scripts via a request to a .php file with "sms" in the URL, which is included in the PATH_INFO portion of the $PHP_SELF variable, as demonstrated using "mail_send.php/sms".
CVSS 2.0 breakdown
| Base score | 7.5 (HIGH) |
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| Attack vector | NETWORK |
| Attack complexity | LOW |
| Confidentiality | PARTIAL |
| Integrity | PARTIAL |
| Availability | PARTIAL |
Affected products
Phprojekt phprojekt
Check this CVE live
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- http://online.securityfocus.com/archive/1/269407
- http://www.securityfocus.com/bid/4596
- https://exchange.xforce.ibmcloud.com/vulnerabilities/8943
Data: NIST NVD. NVD last modified 2026-04-16. Always verify against the vendor advisory before acting.