vendor:
Fishyshoop
by:
James Gray
7,5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: Fishyshoop
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
Fishyshoop Security Vulnerability
This exploit allows an attacker to bypass authentication and register as an admin on Fishyshoop, a web application. The exploit uses the WWW::Curl::Easy Perl module to send a POST request to the Fishyshoop root URL with the desired username and password, and the is_admin parameter set to 1. This allows the attacker to register as an admin without any authentication.
Mitigation:
Ensure that authentication is properly implemented and that the is_admin parameter is not vulnerable to manipulation.