VID |
21853 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Geeklog program is vulnerable to an authorization bypass vulnerability via the session cookie. Geeklog is an open-source Web log software written in PHP and MySQL. Geeklog versions 1.4.x before 1.4.0sr2, 1.3.11 before 1.3.11sr5, 1.3.9 before 1.3.9sr5 are vulnerable to an authorization bypass vulnerability, caused by a flaw in its session-handling library. A remote attacker could exploit this vulnerability to bypass the authentication procedure and gain unauthorized access to a vulnerable application with administrative privileges.
* References: http://www.geeklog.net/article.php/geeklog-1.4.0sr2 http://www.frsirt.com/english/advisories/2006/0851
* Platforms Affected: Geeklog versions 1.3.9 prior to 1.3.9sr5 Geeklog versions 1.3.11 prior to 1.3.11sr5 Geeklog versions 1.4.x prior to 1.4.0sr2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Geeklog (1.3.9sr5 or 1.3.11sr5 or 1.4.0sr2 or later), available from the Geeklog Web site at http://www.geeklog.net/filemgmt/viewcat.php?cid=8 |
Related URL |
CVE-2006-1069 (CVE) |
Related URL |
17010 (SecurityFocus) |
Related URL |
(ISS) |
|