lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030919204017.31211.qmail@sf-www1-symnsj.securityfocus.com>
Date: 19 Sep 2003 20:40:17 -0000
From: Bahaa Naamneh <b_naamneh@...mail.com>
To: bugtraq@...urityfocus.com
Subject: Admin Access Vulnerability in Community Wizard




Admin Access Vulnerability in Community Wizard


Affected Systems: Community Wizard

version: 5.1 (and possibly earlier versions)

Vendor: http://www.sepcity.com , http://www.commwiz.com

Issue: gain admin access

Released: 18 September 2003


Introduction:
=============
"Community Wizard allows anyone to run their own web Portal site without any programming knowledge. Features includes: user login/signup, site search, user profiles, content management, user management, adserver, search engines, forums, file libraries, guestbook, instant messenger, full administration section to allow the admin to manage the web site with page editors, module editors, general setup, site layout and several modules."


Details:
========
It is possible to gain admin access due to a flaw in the 'login.asp' file.
due to a flaw in the script that checking the username and the password it is possible to gain admin access by using this code 'or''=' as the password and not important what the username that you enter, you can enter whatever in the Username field.

Username: whatever
Password: 'or''='


Vendor status:
==============
The vendor has been informed, and bug has been fixed as they told me.


Discovered by/Credit:
=====================
Bahaa Naamneh
b_naamneh@...mail.com
http://www.bsecurity.tk


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ