exploit-db-mirror/exploits/php/webapps/21661.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

13 lines
No EOL
553 B
Text

source: https://www.securityfocus.com/bid/5347/info
dotproject is prone to an issue which may allow remote attackers to bypass authentication and gain administrative access to the software.
This may be accomplished by submitting a maliciously crafted 'user_cookie' value either manually or via manipulation of URI parameters.
This problem is due to the software relying on the user 'cookie_value' to authenticate the user.
curl -b user_cookie=1 http://server/project/index.php?m=projects
or
http://server/project/index.php?m=projects&user_cookie=1