phpTrafficA <=1.4.3 Admin Login Bypass

2007.07.11
Credit: CorryL
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

-=[--------------------ADVISORY-------------------]=- phpTrafficA <=1.4.3 Author: CorryL [corryl80 (at) gmail (dot) com [email concealed]] -=[-----------------------------------------------]=- -=[+] Application: phpTrafficA -=[+] Version: <=1.4.3 -=[+] Vendor's URL: http://soft.zoneo.net/phpTrafficA/index.php -=[+] Platform: WindowsLinuxUnix -=[+] Bug type: Admin Login Bypass -=[+] Exploitation: Remote -=[-] -=[+] Author: CorryL ~ corryl80[at]gmail[dot]com ~ -=[+] Reference: http://corryl.altervista.org/ -=[+] Irc Chan: irc.darksin.net #x0n3-h4ck -=[+] Dork: intitle:phpTrafficA -- web statistics ..::[ Descriprion ]::.. phpTrafficA is a GPL statistical tool for web traffic analysis, written in php and mySQL. It can track access counts to your website, search engines, keywords, and referrers that lead to you, operating systems, web browsers, visitor retention, path analysis, and a lot more! ..::[ Bug ]::.. This software is affection from a bug type login bypass, a remote attaker is able to exploit this vulnerability for loghing with privileges to administrator. To exploit this bug needs to use a software to track and modify https / https request, example "TamperData" an addons for firefox that allows to do this. Once intercepted the http request adding a header "Cookie" with the value username=traffic. ..::[ Proof Of Concept ]::.. adding the header Cookie with the value username=traffic


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top