Alguest 1.1c-patched Authentication Bypass

2010.12.05
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

New eVuln Advisory: Cookie authentication bypass in Alguest Summary: http://evuln.com/vulns/152/summary.html Details: http://evuln.com/vulns/152/description.html -----------Summary----------- eVuln ID: EV0152 Software: Alguest Vendor: n/a Version: 1.1c-patched Critical Level: high Type: Authentication Bypass Status: Unpatched. No reply from developer(s) PoC: Not available Solution: Not available Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ ) --------Description-------- Cookie-based authentication bypass is present in admin.php, opzioni.php, elimina.php, modifica.php scripts. Administration functions are threatened. --------PoC/Exploit-------- Cookie Auth Bypass There is no real password comparison for admin user. Administration scripts check only existence of admin cookie. Cookie: admin=anyvalue ---------Solution---------- Not available ----------Credit----------- Vulnerability discovered by Aliaksandr Hartsuyeu http://evuln.com/tool/php-security.html - php source analyzer


Vote for this issue:
50%
50%

Comment it here.

Copyright 2025, cxsecurity.com

 

Back to Top