header-logo
Suggest Exploit
vendor:
Portix-PHP
by:
SecurityFocus
6.4
CVSS
MEDIUM
Cookie Manipulation
287
CWE
Product Name: Portix-PHP
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Unix and Linux variants
2002

Portix-PHP Cookie Manipulation Vulnerability

Portix-PHP is freely available web portal software. It is written in PHP and will run on most Unix and Linux variants. Portix-PHP uses non-expiring cookies for session management. It is possible for a malicious user to manipulate values in their cookie to gain access to administrative pages on the web portal. Successful hijacking of the administrative account will permit the malicious user to access all of the web portal's administrative facilities. Change the values in the stored cookie to the following: name=access value=ok

Mitigation:

Ensure that cookies are properly validated and that access to administrative pages is restricted to authorized users.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/4041/info

Portix-PHP is freely available web portal software. It is written in PHP and will run on most Unix and Linux variants.

Portix-PHP uses non-expiring cookies for session management. It is possible for a malicious user to manipulate values in their cookie to gain access to administrative pages on the web portal.

Successful hijacking of the administrative account will permit the malicious user to access all of the web portal's administrative facilities.

Change the values in the stored cookie to the following:

name=access value=ok