vendor:
EkinBoard
by:
Eugene Minaev
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: EkinBoard
Affected Version From: 1.1.2000
Affected Version To: 1.1.2000
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
EkinBoard Remote File Upload / Auth Bypass
EkinBoard version 1.1.0 and below are vulnerable to an authentication bypass vulnerability. This vulnerability allows an attacker to bypass the authentication check by setting the _groups[] parameter to 2. This can be done by appending the parameter to the URL, for example: test1.ru/skvoznoy/backup.php?_groups[]=2. Additionally, the upload function can be used to upload any file bypassing the filters. The attacker can name the shell file.php.gif and select it as their avatar. The uploaded file can then be found in the uploaded/avatars/filename_your_id.php directory.
Mitigation:
Disable register_globals and ensure that authentication checks are properly implemented.