GOnicus System Administrator Unauthorized Data Manipulation Vulnerability

BID:22075

Info

GOnicus System Administrator Unauthorized Data Manipulation Vulnerability

Bugtraq ID: 22075
Class: Design Error
CVE:
Remote: Yes
Local: No
Published: Jan 16 2007 12:00AM
Updated: Jan 16 2007 10:20PM
Credit: The vendor reported this issue.
Vulnerable: GONiCUS System Administrator 2.5.7
GONiCUS System Administrator 2.5.6
GONiCUS System Administrator 2.5.5
GONiCUS System Administrator 2.5.4
GONiCUS System Administrator 2.5.3
GONiCUS System Administrator 2.5.2
GONiCUS System Administrator 2.5.1
GONiCUS System Administrator 2.5
GONiCUS System Administrator 2.4beta3
GONiCUS System Administrator 2.4beta2
GONiCUS System Administrator 2.4beta1
GONiCUS System Administrator 2.4
GONiCUS System Administrator 2.3
Not Vulnerable: GONiCUS System Administrator 2.5.8

Discussion

GOnicus System Administrator Unauthorized Data Manipulation Vulnerability

GOnicus System Administrator is prone to a vulnerability that may allow an attacker to manipulate certain settings and object values.

An attacker can exploit this issue to manipulate settings and other values in the affected application, which may allow the attacker to gain administrative access to the affected application.

This issue affects versions prior to 2.5.8.

Exploit / POC

GOnicus System Administrator Unauthorized Data Manipulation Vulnerability

An attacker can exploit this issue through a web client.

Solution / Fix

GOnicus System Administrator Unauthorized Data Manipulation Vulnerability

Solution:
The vendor has released an update to address this issue. Please see the references for more information.

References

GOnicus System Administrator Unauthorized Data Manipulation Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report