lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon Feb 20 18:38:11 2006
From: mail at hackingspirits.com (Debasis Mohanty)
Subject: PHPMyChat Authentication Bypass

PHPMyChat Authentication Bypass
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
I won't have bothered to post this silly flaw but after seeing the google
search result for inurl:phpMyChat.php3 , I thought it would be good idea to
keep people informed.


I. BACKGROUND

phpMyChat is an easy-to-install, easy-to-use multi-room chat based on PHP
and a database, supporting MySQL, PostgreSQL, and ODBC. It supports some
IRC-like commands, and has been translated to 33 different languages.


II. BUG DESCRIPTION

In the default installation of phpmychat (version 0.14.5) any unregistered
user can get access to the chat rooms by inputing both the user name and
password as same in the input box. i.e. the user name should be same as
password. I tried loging in through various vulnerable sites using these
user id and password combination which granted me un-authorised access to
the rooms - 

User Id	Password
~~~~~~~~	~~~~~~~~
admin		admin
user 		user
hacked	hacked

... 
...


Note: In some cases the user id with 'admin' might not work for the password
as 'admin' as during installation the owner might have changed it.

III. IMPACT
Un-authorised user access to chat rooms


IV. AFFECTED PRODUCTS
I have only tested this for PhpMyChat 0.14.5 but I guess the previous
versions might also be affected.
 
V. VENDOR
http://phpmychat.sourceforge.net
http://www.phpheaven.net/rubrique4.html


VI. CREDITS
Debasis Mohanty
www.hackingspirits.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ