Alguest 1.1c-patched Authentication Bypass

2010.12.05
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

New eVuln Advisory: Cookie authentication bypass in Alguest Summary: http://evuln.com/vulns/152/summary.html Details: http://evuln.com/vulns/152/description.html -----------Summary----------- eVuln ID: EV0152 Software: Alguest Vendor: n/a Version: 1.1c-patched Critical Level: high Type: Authentication Bypass Status: Unpatched. No reply from developer(s) PoC: Not available Solution: Not available Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ ) --------Description-------- Cookie-based authentication bypass is present in admin.php, opzioni.php, elimina.php, modifica.php scripts. Administration functions are threatened. --------PoC/Exploit-------- Cookie Auth Bypass There is no real password comparison for admin user. Administration scripts check only existence of admin cookie. Cookie: admin=anyvalue ---------Solution---------- Not available ----------Credit----------- Vulnerability discovered by Aliaksandr Hartsuyeu http://evuln.com/tool/php-security.html - php source analyzer


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top