Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11181
HistoryJan 25, 2006 - 12:00 a.m.

[SA18601] Reamday Enterprises Magic News Password Change Bypass

2006-01-2500:00:00
vulners.com
10

TITLE:
Reamday Enterprises Magic News Password Change Bypass

SECUNIA ADVISORY ID:
SA18601

VERIFY ADVISORY:
http://secunia.com/advisories/18601/

CRITICAL:
Moderately critical

IMPACT:
Security Bypass

WHERE:
>From remote

SOFTWARE:
Reamday Enterprises Magic News Plus 1.x
http://secunia.com/product/6980/
Reamday Enterprises Magic News Lite 1.x
http://secunia.com/product/6981/

DESCRIPTION:
cijfer has discovered a vulnerability in Reamday Enterprises Magic
News, which can be exploited by malicious people to bypass certain
security restrictions.

Input passed to the "admin_password" parameter in "settings.php"
isn't properly verified before being used to do a password
comparison. This can be exploited to change the administrator's
password by setting the "new_passwd" and "confirm_passwd" parameters
to the new password.

Successful exploitation allows access to the administration section,
but requires that "register_globals" is enabled.

The vulnerability has been confirmed in Magic News Lite 1.2.3 and has
also been reported in Magic News Plus 1.0.3 and prior. Other versions
may also be affected.

SOLUTION:
Restrict direct web access to the "settings.php" script (e.g. with
.htaccess).

PROVIDED AND/OR DISCOVERED BY:
cijfer


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.