Full Disclosure mailing list archives
phpTrafficA <=1.4.3 Admin Login Bypass
From: <corrado.liotta () alice it>
Date: Fri, 6 Jul 2007 20:22:10 +0200
-=[--------------------ADVISORY-------------------]=-
phpTrafficA <=1.4.3
Author: CorryL [corryl80 () gmail com]
-=[-----------------------------------------------]=-
-=[+] Application: phpTrafficA
-=[+] Version: <=1.4.3
-=[+] Vendor's URL: http://soft.zoneo.net/phpTrafficA/index.php
-=[+] Platform: Windows\Linux\Unix
-=[+] Bug type: Admin Login Bypass
-=[+] Exploitation: Remote
-=[-]
-=[+] Author: CorryL ~ corryl80[at]gmail[dot]com ~
-=[+] Reference: http://corryl.altervista.org/
-=[+] Irc Chan: irc.darksin.net #x0n3-h4ck
-=[+] Dork: intitle:phpTrafficA -- web statistics
..::[ Descriprion ]::..
phpTrafficA is a GPL statistical tool for web traffic analysis, written in php and mySQL.
It can track access counts to your website, search engines, keywords,
and referrers that lead to you, operating systems, web browsers, visitor retention,
path analysis, and a lot more!
..::[ Bug ]::..
This software is affection from a bug type login bypass, a remote attaker
is able to exploit this vulnerability for loghing with privileges to administrator.
To exploit this bug needs to use a software to track and modify https / https request, example
"TamperData" an addons for firefox that allows to do this.
Once intercepted the http request adding a header "Cookie" with the value username=traffic.
..::[ Proof Of Concept ]::..
adding the header Cookie with the value username=traffic
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- phpTrafficA <=1.4.3 Admin Login Bypass corrado.liotta (Jul 06)
