source: http://www.securityfocus.com/bid/40207/info
PonVFTP is prone to an authentication-bypass vulnerability because it fails to adequately verify user-supplied input used for cookie-based authentication.
Attackers can exploit this vulnerability to gain administrative access to the affected application, which may aid in further attacks.
The following example data is available:
javascript:document.cookie="username=admin";
{"id": "EDB-ID:33994", "hash": "4f77aba3c8c5b6fad4b24e114bd3afee", "type": "exploitdb", "bulletinFamily": "exploit", "title": "PonVFTP Insecure Cookie Authentication Bypass Vulnerability", "description": "PonVFTP Insecure Cookie Authentication Bypass Vulnerability. Webapps exploit for php platform", "published": "2010-05-17T00:00:00", "modified": "2010-05-17T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/33994/", "reporter": "SkuLL-HackeR", "references": [], "cvelist": [], "lastseen": "2016-02-03T20:16:37", "history": [], "viewCount": 0, "enchantments": {"score": {"value": 0.5, "vector": "NONE", "modified": "2016-02-03T20:16:37"}, "dependencies": {"references": [], "modified": "2016-02-03T20:16:37"}, "vulnersScore": 0.5}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/33994/", "sourceData": "source: http://www.securityfocus.com/bid/40207/info\r\n\r\nPonVFTP is prone to an authentication-bypass vulnerability because it fails to adequately verify user-supplied input used for cookie-based authentication.\r\n\r\nAttackers can exploit this vulnerability to gain administrative access to the affected application, which may aid in further attacks. \r\n\r\nThe following example data is available:\r\n\r\njavascript:document.cookie=\"username=admin\"; ", "osvdbidlist": [], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}