lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <52EA169C.1070001@securatary.com>
Date: Thu, 30 Jan 2014 01:08:44 -0800
From: Mark Litchfield <mark@...uratary.com>
To: webappsec@...urityfocus.com, bugtraq@...urityfocus.com,
  vuln-dev@...urityfocus.com
Subject: Ektron CMS Take Over - Hijacking Accounts

I have detailed a vulnerability within Ektron CMS that allows an 
unauthenticated user to hijack any account.  The clear targets of choice 
for this CMS would be the builtin or admin account.

Whilst I found this issue back in 2012, it appears that around 65% are 
still vulnerable and should be patching their systems.  I did notify 
Ektron about this and I know a patch was made, but I did not bother 
releasing an advisory.  Why now...  Way to many sites have still not 
updated, this could be in part because it appears there is no mention of 
the issue on Ektrons site.  Security issues are always a good incentive 
to adopt patches.  The other reason being, I have a new vulnerability in 
their fix and I will follow up with this shortly.

As usual, full details can be found here with Screen shots - 
http://www.securatary.com/vulnerabilities

All the best

Mark

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ