vendor:
Chipmunk Blog
by:
x0r
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: Chipmunk Blog
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Chipmunk Blog Add Admin Exploit/Auth Bypass
Chipmunk Blog is vulnerable to an authentication bypass vulnerability. An attacker can exploit this vulnerability to gain administrative access to the application. This is due to the application not properly sanitizing user-supplied input to the 'username' and 'password' parameters in the 'reguser.php' and 'authenticate.php' scripts. An attacker can exploit this vulnerability by supplying a specially crafted 'username' and 'password' parameters when authenticating to the application.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to modify the application's logic. Additionally, the application should use a secure authentication mechanism to ensure that only authorized users can access the application.