lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 15 Nov 2007 10:41:14 +0100
From: "MC Iglo" <mc.iglo@...glemail.com>
To: bugtraq@...urityfocus.com
Subject: Aida-Web Information Exposure

Hi list,

Parameters being transferred per $_GET aren't sanitised properly.

http://name.tld/CGI-Bin/frame.html?Mehr=xxx

Everyone can read any comment and its poster, although it should be
readable only for superiors

http://name.tld/CGI-Bin/frame.html?Mehr=xxx&SUPER=x
You can see, which supervisor the task was forwarded to and their UniqueIDs


Anyways, everything is acting really strange if you try to test something.
Out of 10 tries, u get
8x All information you want to get
1x a weird name instead of the real one
1x a Errorpage like 404, "session timed out", blank site,...

For all these tests it is not necessary to be logged in.
There might be a lot more bugs, but I can't look for them on a live system :(

Vendor: http://www.aida-orga.de/

Regards
MC.Iglo

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ