Authentication bypass in phpLiterAdmin

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Vulnerability ID: HTB22653
Reference: http://www.htbridge.ch/advisory/authentication_bypass_in_phpliteradmin.html
Product: phpLiterAdmin 
Vendor: phpLiterAdmin  ( http://code.google.com/p/phpliteradmin/ ) 
Vulnerable Version: 1.0 RC1 and probably prior versions 
Vendor Notification: 13 October 2010 
Vulnerability Type: Authentication bypass
Status: Fixed by Vendor
Risk level: High 
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) 

Vulnerability Details:
phpLiterAdmin is affected by an authentication bypass vulnerability.
This issue is due to the application failing to properly sanitize user-supplied input during authentication.
Exploitation of this vulnerability would permit unauthorized access to any known account.

Authentication can be bypassed by setting the special crafted cookies:


phpLiterAdmin432=a:2:{s:8:"username"%3bs:5:"admin"%3bs:8:"password"%3bb:1%3b};

Solution: Upgrade to the most recent version



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux