lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <004a01c4009c$31786b10$1559d53e@pigkiller>
From: pk95 at yandex.ru (Alexander)
Subject: Authentication flaw in Web Wiz forum

Product:  Web Wiz forum 7.0-7.7a www.webwizforum.com

Risk:          Medium

Date:         02 March, 2004

Autor:        Pig Killer and Michael ( www.SecurityLab.ru)



When user log on forum, for his cookies identification forum using User_code
value from tblAutor table from underlying database, which doesn't change
with changing of password. As a result, when user change password, he can
register in the forum using old cookies. As a result, if users cookies was
compromised (for example by XSS), then even password changing will doesn't
protect his account from unauthorized using.



The forum also allows logged in user to change the password without entering
the old one. Thus, having cookie, you can change the password without
knowing the old one.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ