vendor:
XAMPP
by:
Michael Brooks
7.5
CVSS
HIGH
Global variable manipulation and XSRF
20
CWE
Product Name: XAMPP
Affected Version From: 1.6.2008
Affected Version To: 1.6.2008
Patch Exists: YES
Related CWE: N/A
CPE: a:apache:xampp
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2008
XAMPP change administrative password
XAMPP has two vulnerabilities that are being used together: Global variable manipulation to spoof ip address and XSRF to change the .htaccess password for http://10.1.1.10/security/ and http://10.1.1.10/xampp/. The $_SERVER[REMOTE_ADDR] comes directly from Apache's tcp socket and this cannot normally be spoofed. However extract($_POST); can be used to overwrite any declared variable, including the $_SERVER superglobal. This can be used to 'spoof' the ip address as 127.0.0.1. This xsrf attack can be exploited from a browser in any ip address, so long as that browser is currently authenticated.
Mitigation:
Disable register_globals in php.ini and use a secure authentication system.