|
[ Message Precedent sur la mailing][ Message Suivant sur la mailing][ Precedent dans le fil][ Prochain dans le fil][ Index par Date][ Index par fil]
[SA32517] Acc Scripts Products "username_cookie" Cookie Security Bypass
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
link://[click]
TITLE:
Acc Scripts Products "username_cookie" Cookie Security Bypass
SECUNIA ADVISORY ID:
SA32517
VERIFY ADVISORY:
link://[click]
CRITICAL:
Moderately critical
IMPACT:
Security Bypass
WHERE:
From remote
SOFTWARE:
Acc Autos 4.x
link://[click]
Acc Real Estate 4.x
link://[click]
Acc Statistics 1.x
link://[click]
DESCRIPTION:
Hakxer has reported a vulnerability in multiple Acc Scripts products,
which can be exploited by malicious people to bypass certain security
restrictions.
The vulnerability is caused due to the applications allowing access
to the admin interface by checking if a certain cookie exists. This
can be exploited to gain administrative access to the application by
creating the cookie "username_cookie" and assigning it the value
"admin".
This vulnerability is reported in Acc Real Estate and Autos version
4.0 and Acc Statistics version 1.1. Other versions may also be
affected.
SOLUTION:
Ensure that proper access restrictions are implemented.
PROVIDED AND/OR DISCOVERED BY:
Hakxer
ORIGINAL ADVISORY:
link://[click]
link://[click]
link://[click]
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
link://[click]
Definitions: (Criticality, Where etc.)
link://[click]
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|