Vulnerability Name:

CVE-2004-1950 (CCN-15909)

Assigned:2004-04-18
Published:2004-04-18
Updated:2017-07-11
Summary:phpBB 2.0.8a and earlier trusts the IP address that is in the X-Forwarded-For in the HTTP header, which allows remote attackers to spoof IP addresses.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: BugTraq Mailing List, Sun Apr 18 2004 - 19:01:29 CDT
phpBB 2.0.8a and lower - IP spoofing vulnerability

Source: MITRE
Type: CNA
CVE-2004-1950

Source: BUGTRAQ
Type: UNKNOWN
20040419 phpBB 2.0.8a and lower - IP spoofing vulnerability

Source: BUGTRAQ
Type: UNKNOWN
20040419 Re: phpBB 2.0.8a and lower - IP spoofing vulnerability

Source: CCN
Type: SA11434
phpBB IP Spoofing Issue

Source: SECUNIA
Type: Exploit, Patch, Vendor Advisory
11434

Source: CCN
Type: OSVDB ID: 7815
phpBB common.php IP Spoofing Access Bypass

Source: BID
Type: Patch, Vendor Advisory
10170

Source: CCN
Type: BID-10170
PHPBB Common.php IP Address Spoofing Vulnerability

Source: XF
Type: UNKNOWN
phbb-common-ip-spoofing(15909)

Source: XF
Type: UNKNOWN
phbb-common-ip-spoofing(15909)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.6c:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.6d:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.7a:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.8a:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    phpbb_group phpbb 2.0.0
    phpbb_group phpbb 2.0.1
    phpbb_group phpbb 2.0.2
    phpbb_group phpbb 2.0.3
    phpbb_group phpbb 2.0.4
    phpbb_group phpbb 2.0.5
    phpbb_group phpbb 2.0.6
    phpbb_group phpbb 2.0.6c
    phpbb_group phpbb 2.0.6d
    phpbb_group phpbb 2.0.7
    phpbb_group phpbb 2.0.7a
    phpbb_group phpbb 2.0.8
    phpbb_group phpbb 2.0.8a