[SA18601] Reamday Enterprises Magic News Password Change Bypass

2006-01-25T00:00:00
ID SECURITYVULNS:DOC:11181
Type securityvulns
Reporter Securityvulns
Modified 2006-01-25T00:00:00

Description

TITLE: Reamday Enterprises Magic News Password Change Bypass

SECUNIA ADVISORY ID: SA18601

VERIFY ADVISORY: http://secunia.com/advisories/18601/

CRITICAL: Moderately critical

IMPACT: Security Bypass

WHERE: >From remote

SOFTWARE: Reamday Enterprises Magic News Plus 1.x http://secunia.com/product/6980/ Reamday Enterprises Magic News Lite 1.x http://secunia.com/product/6981/

DESCRIPTION: cijfer has discovered a vulnerability in Reamday Enterprises Magic News, which can be exploited by malicious people to bypass certain security restrictions.

Input passed to the "admin_password" parameter in "settings.php" isn't properly verified before being used to do a password comparison. This can be exploited to change the administrator's password by setting the "new_passwd" and "confirm_passwd" parameters to the new password.

Successful exploitation allows access to the administration section, but requires that "register_globals" is enabled.

The vulnerability has been confirmed in Magic News Lite 1.2.3 and has also been reported in Magic News Plus 1.0.3 and prior. Other versions may also be affected.

SOLUTION: Restrict direct web access to the "settings.php" script (e.g. with .htaccess).

PROVIDED AND/OR DISCOVERED BY: cijfer


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.