TITLE: Reamday Enterprises Magic News Password Change Bypass
SECUNIA ADVISORY ID: SA18601
VERIFY ADVISORY: http://secunia.com/advisories/18601/
CRITICAL: Moderately critical
IMPACT: Security Bypass
WHERE: >From remote
SOFTWARE: Reamday Enterprises Magic News Plus 1.x http://secunia.com/product/6980/ Reamday Enterprises Magic News Lite 1.x http://secunia.com/product/6981/
DESCRIPTION: cijfer has discovered a vulnerability in Reamday Enterprises Magic News, which can be exploited by malicious people to bypass certain security restrictions.
Input passed to the "admin_password" parameter in "settings.php" isn't properly verified before being used to do a password comparison. This can be exploited to change the administrator's password by setting the "new_passwd" and "confirm_passwd" parameters to the new password.
Successful exploitation allows access to the administration section, but requires that "register_globals" is enabled.
The vulnerability has been confirmed in Magic News Lite 1.2.3 and has also been reported in Magic News Plus 1.0.3 and prior. Other versions may also be affected.
SOLUTION: Restrict direct web access to the "settings.php" script (e.g. with .htaccess).
PROVIDED AND/OR DISCOVERED BY: cijfer
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.