phpTrafficA <=1.4.3 Admin Login Bypass

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-=[--------------------ADVISORY-------------------]=-
                                              
                     phpTrafficA <=1.4.3
                                               
  Author: CorryL    [corryl80@xxxxxxxxx]   
-=[-----------------------------------------------]=-


-=[+] Application:    phpTrafficA
-=[+] Version:        <=1.4.3
-=[+] Vendor's URL:   http://soft.zoneo.net/phpTrafficA/index.php
-=[+] Platform:       Windows\Linux\Unix
-=[+] Bug type:       Admin Login Bypass
-=[+] Exploitation:   Remote
-=[-]
-=[+] Author:          CorryL  ~ corryl80[at]gmail[dot]com ~
-=[+] Reference:       http://corryl.altervista.org/
-=[+] Irc Chan:        irc.darksin.net #x0n3-h4ck        
-=[+] Dork:            intitle:phpTrafficA -- web statistics

..::[ Descriprion ]::..

phpTrafficA is a GPL statistical tool for web traffic analysis, written in php and mySQL. 
It can track access counts to your website, search engines, keywords, 
and referrers that lead to you, operating systems, web browsers, visitor retention, 
path analysis, and a lot more!



..::[ Bug ]::..

This software is affection from a bug type login bypass, a remote attaker 
is able to exploit this vulnerability for loghing with privileges to administrator.
To exploit this bug needs to use a software to track and modify https / https request, example
"TamperData" an addons for firefox that allows to do this.
Once intercepted the http request adding a header "Cookie" with the value username=traffic.

..::[ Proof Of Concept ]::..

adding the header Cookie with the value username=traffic


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux