[VulnWatch] P-News 1.16 Admin Access Vulnerability

From: Peter Winter-Smith (peter4020_at_hotmail.com)
Date: 05/24/03

  • Next message: K. K. Mookhey: "[VulnWatch] NII Advisory - Buffer Overflow in Analogx Proxy"
    To: vuln@secunia.com
    Date: Sat, 24 May 2003 09:15:47 +0000

    Admin Access Vulnerability in P-News 1.6

    Url: http://www.ppopn.net

    It is possible to gain admin access if you possess a 'Member'
    account due to a flaw in the 'p-news.php' file.
    You can inject an entire arbitrary account, including all the fields, into
    the 'Name' field, which will push all the restricting details to the far end
    of the data string, not allowing them to be included in the login process.
    Below is an example of a normal database:


    Notice the '0' denotes an 'admin' account, and the '2' denotes a 'member'


    Into the 'Name' field in the edit account information section will give the
    malicious user admin privileges.
    The database then looks like:



    Operating system and servicepack level:
    Windows/Linux/Unix + PHP

    P-News 1.16 (possibly 1.17)

    Under what circumstances the vulnerability was discovered:
    Under a vulnerability search.

    If the vendor has been notified:
    The vendor has not been notified because he does not speak English, so much
    confusion may arise.

    How to contact you for further information:
    I can always be reached at peter4020@hotmail.com

    Please credit this find to:
    Peter Winter-Smith of Team UEC

    Thank you for your time,

    Sign-up for a FREE BT Broadband connection today!

  • Next message: K. K. Mookhey: "[VulnWatch] NII Advisory - Buffer Overflow in Analogx Proxy"