Korean
<< Back
VID 21853
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Geeklog program is vulnerable to an authorization bypass vulnerability via the session cookie. Geeklog is an open-source Web log software written in PHP and MySQL. Geeklog versions 1.4.x before 1.4.0sr2, 1.3.11 before 1.3.11sr5, 1.3.9 before 1.3.9sr5 are vulnerable to an authorization bypass vulnerability, caused by a flaw in its session-handling library. A remote attacker could exploit this vulnerability to bypass the authentication procedure and gain unauthorized access to a vulnerable application with administrative privileges.

* References:
http://www.geeklog.net/article.php/geeklog-1.4.0sr2
http://www.frsirt.com/english/advisories/2006/0851

* Platforms Affected:
Geeklog versions 1.3.9 prior to 1.3.9sr5
Geeklog versions 1.3.11 prior to 1.3.11sr5
Geeklog versions 1.4.x prior to 1.4.0sr2
Any operating system Any version
Recommendation Upgrade to the latest version of Geeklog (1.3.9sr5 or 1.3.11sr5 or 1.4.0sr2 or later), available from the Geeklog Web site at http://www.geeklog.net/filemgmt/viewcat.php?cid=8
Related URL CVE-2006-1069 (CVE)
Related URL 17010 (SecurityFocus)
Related URL (ISS)