header-logo
Suggest Exploit
vendor:
phpLiterAdmin
by:
High-Tech Bridge SA - Ethical Hacking & Penetration Testing
7.5
CVSS
HIGH
Authentication bypass
287
CWE
Product Name: phpLiterAdmin
Affected Version From: 1.0 RC1
Affected Version To:
Patch Exists: YES
Related CWE:
CPE: cpe:2.3:a:phpliteradmin:phpliteradmin:1.0_rc1:*:*:*:*:*:*:*
Metasploit:
Other Scripts:
Platforms Tested:
2010

Authentication Bypass in phpLiterAdmin

The phpLiterAdmin application is affected by an authentication bypass vulnerability. The issue occurs due to improper sanitization of user-supplied input during authentication. Exploiting this vulnerability allows unauthorized access to any known account by setting specially crafted cookies.

Mitigation:

Upgrade to the most recent version
Source

Exploit-DB raw data:

Vulnerability ID: HTB22653
Reference: http://www.htbridge.ch/advisory/authentication_bypass_in_phpliteradmin.html
Product: phpLiterAdmin 
Vendor: phpLiterAdmin  ( http://code.google.com/p/phpliteradmin/ ) 
Vulnerable Version: 1.0 RC1 and probably prior versions 
Vendor Notification: 13 October 2010 
Vulnerability Type: Authentication bypass
Status: Fixed by Vendor
Risk level: High 
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) 

Vulnerability Details:
phpLiterAdmin is affected by an authentication bypass vulnerability.
This issue is due to the application failing to properly sanitize user-supplied input during authentication.
Exploitation of this vulnerability would permit unauthorized access to any known account.

Authentication can be bypassed by setting the special crafted cookies:


phpLiterAdmin432=a:2:{s:8:"username"%3bs:5:"admin"%3bs:8:"password"%3bb:1%3b};

Solution: Upgrade to the most recent version