Authentication Bypass in Rational Soft's Hidden Administrator

2007.05.22
Risk: High
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

REWTERZ-20070518 - Authentication Bypass in Rational Soft's Hidden Administrator Release Date: 18 May, 2007 Severity: High (Remote Code Execution) Vendor: Rational Soft Software Affected: Hidden Administrator v1.7 and below Overview: rewterz has discovered a critical vulnerability in Hidden Administrator. This vulnerability allows a remote attacker to execute arbitrary code in the context of the user who executed Hidden Administrator. Technical Details: Authentication mechanism of Hidden Administrator can be bypassed with ease via this vulnerability. With authentication bypassed at the Hidden Administrator server, any malicious user can cause Hidden Administrator to run arbitrary code and assume full control of the system on which Hidden Administrator is running. We have confirmed the ability to execute arbitrary own code. This is an authentication bypass vulnerability which can be exploited easily. Credit: Muhammad Ahmed Siddiqui Copyright (c) 2003-2007 rewterz, inc Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of rewterz. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top