[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070706182823.9550.qmail@securityfocus.com>
Date: 6 Jul 2007 18:28:23 -0000
From: corrado.liotta@...ce.it
To: bugtraq@...urityfocus.com
Subject: phpTrafficA <=1.4.3 Admin Login Bypass
-=[--------------------ADVISORY-------------------]=-
phpTrafficA <=1.4.3
Author: CorryL [corryl80@...il.com]
-=[-----------------------------------------------]=-
-=[+] Application: phpTrafficA
-=[+] Version: <=1.4.3
-=[+] Vendor's URL: http://soft.zoneo.net/phpTrafficA/index.php
-=[+] Platform: Windows\Linux\Unix
-=[+] Bug type: Admin Login Bypass
-=[+] Exploitation: Remote
-=[-]
-=[+] Author: CorryL ~ corryl80[at]gmail[dot]com ~
-=[+] Reference: http://corryl.altervista.org/
-=[+] Irc Chan: irc.darksin.net #x0n3-h4ck
-=[+] Dork: intitle:phpTrafficA -- web statistics
..::[ Descriprion ]::..
phpTrafficA is a GPL statistical tool for web traffic analysis, written in php and mySQL.
It can track access counts to your website, search engines, keywords,
and referrers that lead to you, operating systems, web browsers, visitor retention,
path analysis, and a lot more!
..::[ Bug ]::..
This software is affection from a bug type login bypass, a remote attaker
is able to exploit this vulnerability for loghing with privileges to administrator.
To exploit this bug needs to use a software to track and modify https / https request, example
"TamperData" an addons for firefox that allows to do this.
Once intercepted the http request adding a header "Cookie" with the value username=traffic.
..::[ Proof Of Concept ]::..
adding the header Cookie with the value username=traffic
Powered by blists - more mailing lists