Alguest 1.1c-patched Authentication Bypass

Risk: High
Local: No
Remote: Yes

New eVuln Advisory: Cookie authentication bypass in Alguest Summary: Details: -----------Summary----------- eVuln ID: EV0152 Software: Alguest Vendor: n/a Version: 1.1c-patched Critical Level: high Type: Authentication Bypass Status: Unpatched. No reply from developer(s) PoC: Not available Solution: Not available Discovered by: Aliaksandr Hartsuyeu ( ) --------Description-------- Cookie-based authentication bypass is present in admin.php, opzioni.php, elimina.php, modifica.php scripts. Administration functions are threatened. --------PoC/Exploit-------- Cookie Auth Bypass There is no real password comparison for admin user. Administration scripts check only existence of admin cookie. Cookie: admin=anyvalue ---------Solution---------- Not available ----------Credit----------- Vulnerability discovered by Aliaksandr Hartsuyeu - php source analyzer

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024,


Back to Top