Lucene search

K

diginews.txt

🗓️ 18 Jul 2003 00:00:00Reported by Arnaud JacquesType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 26 Views

Digi-news and Digi-ads 1.1 allows admin access without password, exploiting cookie authentication.

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Digi-news and Digi-ads version 1.1 admin access without password  
  
.oO Overview Oo.  
Digi-news and Digi-ads version 1.1 admin access without password  
Discovered on 2003, March, 30th  
Vendor: Digi-FX  
  
Digi-news 1.1 is a PHP news editor. It allows you to easily add, edit, and   
delete news.  
Digi-ad 1.1 is a PHP ad rotator. It allows you to easily add, edit, reset, and   
delete ads.  
A vulnerability allows to access to the admin area in both script, without the   
administrator password.  
Original text is at   
http://www.securiteinfo.com/attaques/hacking/digi-news1_1.shtml  
  
  
.oO Details Oo.  
In Digi-news or Digi-ad, the admin web page is admin.php  
Here is a sample of the admin authentification in this admin.php :  
  
if (!isset($action)) {  
$action = '';  
}  
if ($action == 'auth') {  
auth();  
}  
if ((@$HTTP_COOKIE_VARS['user'] != $digiNews['user']) &&   
(@$HTTP_COOKIE_VARS['pass'] != md5($digiNews['pass']))) {  
login();  
exit;  
}  
Continued as admin logged...  
  
  
As you can see, the authentification scheme is based on a cookie. This cookie   
contains the user and the MD5 hashed password. But the programmer did a   
mistake :  
if ((@$HTTP_COOKIE_VARS['user'] != $digiNews['user']) &&   
(@$HTTP_COOKIE_VARS['pass'] != md5($digiNews['pass']))) {  
It means that "Admin is authentificated" if "user = user in the cookie" OR   
"password = password in the cookie". In english, it means you don't need the   
admin password as far as you know the admin login !  
The default admin login is "admin". If it doesn't work, try these :  
  
* Admin  
* Administrator  
* administrator  
* Root  
* root  
* the nickname of the admin (if known)  
* the surname of the admin (if known)  
* etc...  
  
  
.oO Exploit Oo.  
Ok, that's quite easy. You just have to send a handwrited cookie with   
user=admin in. You can do that with the well-known Proxomitron  
  
.oO Solution Oo.  
The solution is to replace the AND operation by a OR operation, as followed :  
if ((@$HTTP_COOKIE_VARS['user'] != $digiNews['user']) ||   
(@$HTTP_COOKIE_VARS['pass'] != md5($digiNews['pass']))) {  
The vendor has been informed and solved the problems. Download Digi-News 1.2   
and Digi-ads 1.2 at http://www.digi-fx.net/freescripts.php  
  
.oO Discovered by Oo.  
Arnaud Jacques aka scrap  
[email protected]  
http://www.securiteinfo.com  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
18 Jul 2003 00:00Current
7.4High risk
Vulners AI Score7.4
26
.json
Report