vendor:
phpx
by:
gnixmail
3.3
CVSS
MEDIUM
Cookie poisoning
284
CWE
Product Name: phpx
Affected Version From: 3.5.16
Affected Version To: 3.5.16
Patch Exists: NO
Related CWE: N/A
CPE: a:phpx:phpx
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: All
2008
Cookie poisoning / Login bypass
PHPX is a web portal system, blog,Content Management System (CMS), forums, and more. Every file in phpx-3.5.16/ directory have two lines of code: one for include includes/functions.inc.php, and another to create a website object. website's constructor will call checkCookie. The function checkCookie set the user_id if PXL cookie is set and the query return an user_id, and an username. The problem is that the query doesn't check the IP address of the user that set the cookie. So, an attacker can set the cookie PXL with the value of a valid session and bypass the login.
Mitigation:
Ensure that the IP address of the user is checked when setting the cookie.