Korean
<< Back
VID 21488
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The CitrusDB software seems to be vulnerable to an authentication bypass vulnerability. CitrusDB is an open-source customer database application that uses PHP and a database backend (currently MySQL). CitrusDB versions 0.3.6 and earlier are vulnerable to an authentication bypass vulnerability, caused by a vulnerability in the application using a static value during the creation of user cookie information. CitrusDB generates easily predictable MD5 hashes of the user name for the id_hash cookie. This allows a remote attacker to bypass authentication and gain privileges by calculating the MD5 checksum of the user name combined with the "boogaadeeboo" string, which is hard-coded in the $hidden_hash variable.

* References:
http://tsyklon.informatik.rwth-aachen.de/redteam/advisories/rt-sa-2005-002
http://seclists.org/lists/fulldisclosure/2005/Feb/0370.html

* Platforms Affected:
SourceForge.net, CitrusDB versions 0.3.6 and earlier
Any Operating system Any version
Recommendation No upgrade or patch available as of March 2005.

As a workaround, change '$hidden_hash_var' in '/citrusdb/include/user.inc.php' to a value different than 'boogaadeeboo'.
Related URL CVE-2005-0408 (CVE)
Related URL 12560 (SecurityFocus)
Related URL (ISS)