lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <004a01c4009c$31786b10$1559d53e@pigkiller> From: pk95 at yandex.ru (Alexander) Subject: Authentication flaw in Web Wiz forum Product: Web Wiz forum 7.0-7.7a www.webwizforum.com Risk: Medium Date: 02 March, 2004 Autor: Pig Killer and Michael ( www.SecurityLab.ru) When user log on forum, for his cookies identification forum using User_code value from tblAutor table from underlying database, which doesn't change with changing of password. As a result, when user change password, he can register in the forum using old cookies. As a result, if users cookies was compromised (for example by XSS), then even password changing will doesn't protect his account from unauthorized using. The forum also allows logged in user to change the password without entering the old one. Thus, having cookie, you can change the password without knowing the old one.
Powered by blists - more mailing lists