vendor:
Invision Power Board
by:
danica jones
7.5
CVSS
HIGH
IPB Authentication Bypass
287
CWE
Product Name: Invision Power Board
Affected Version From: 2
Affected Version To: 2
Patch Exists: YES
Related CWE: N/A
CPE: a:invision_power_services:invision_power_board
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2005
Tutorial for the recent exploit released by Petey Beege
This tutorial explains how to bypass authentication in Invision Power Board (IPB) version 2. It involves exploiting a vulnerability in the IPB authentication system which allows an attacker to bypass authentication and gain access to the application. The exploit requires the attacker to have access to the Mozilla Firefox cookie file, which can be found in the user's profile directory. The attacker then adds two entries to the cookie file, one for the member_id and one for the pass_hash. The values for these entries are taken from the output of the exploit. Once the entries are added, the attacker can then login to the application using the modified cookie file.
Mitigation:
The best way to mitigate this vulnerability is to ensure that the authentication system is secure and that the cookie file is not accessible to unauthorized users.