TITLE:
Reamday Enterprises Magic News Password Change Bypass
SECUNIA ADVISORY ID:
SA18601
VERIFY ADVISORY:
http://secunia.com/advisories/18601/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass
WHERE:
>From remote
SOFTWARE:
Reamday Enterprises Magic News Plus 1.x
http://secunia.com/product/6980/
Reamday Enterprises Magic News Lite 1.x
http://secunia.com/product/6981/
DESCRIPTION:
cijfer has discovered a vulnerability in Reamday Enterprises Magic
News, which can be exploited by malicious people to bypass certain
security restrictions.
Input passed to the "admin_password" parameter in "settings.php"
isn't properly verified before being used to do a password
comparison. This can be exploited to change the administrator's
password by setting the "new_passwd" and "confirm_passwd" parameters
to the new password.
Successful exploitation allows access to the administration section,
but requires that "register_globals" is enabled.
The vulnerability has been confirmed in Magic News Lite 1.2.3 and has
also been reported in Magic News Plus 1.0.3 and prior. Other versions
may also be affected.
SOLUTION:
Restrict direct web access to the "settings.php" script (e.g. with
.htaccess).
PROVIDED AND/OR DISCOVERED BY:
cijfer
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.