Cookie modification allows unauthenticated user login in Geeklog 1.3From: Adrian Chung (firstname.lastname@example.org)
- Previous message: email@example.com: "Security Update: [CSSA-2002-SCO.1] OpenServer: wu-ftpd ftpglob() vulnerability"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
Date: Thu, 10 Jan 2002 12:22:02 -0500 From: Adrian Chung <firstname.lastname@example.org> To: email@example.com
A major security vulnerability exists in Geeklog 1.3, released on
December 30th, 2001.
When permanent cookies are enabled, as they are in a stock install,
Geeklog stores a user's UID in a cookie upon successful login.
This cookie is subsequently used during future visits to the site to
automatically initiate an authenticated session as the UID in the
Modification of the UID in the cookie allows any user to assume the
identity of any other registered user, including the administrative
A bug report was submitted to the author on January 9th, and fixes
were made available shortly after, with instructions on where to
obtain them posted at the Geeklog website (http://www.geeklog.org).
Geeklog is a 'blog', otherwise known as a Weblog. It allows you to
create your own virtual community area, complete with user
administration, story posting, messaging, comments, polls, calendar,
weblinks, and more! It can run on many different operating systems,
and uses PHP4 and MySQL.
-- Adrian Chung (adrian at enfusion-group dot com) http://www.enfusion-group.com/~adrian GPG Fingerprint: C620 C8EA 86BA 79CC 384C E7BE A10C 353B 919D 1A17 [rogue.enfusion-group.com] up 161 days, 4:03, 5 users
- application/pgp-signature attachment: stored