Korean
<< Back
VID 21910
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Geeklog program is vulnerable to an authorization bypass vulnerability in the admin/auth.inc.php script. Geeklog is an open-source Web log software written in PHP and MySQL. Geeklog versions 1.4.x before 1.4.0sr3, 1.3.11 before 1.3.11sr6 are vulnerable to an authorization bypass vulnerability, caused by an SQL injection vulnerability in the admin/auth.inc.php script. If the magic_quotes_gpc setting is disabled, a remote attacker could exploit this vulnerability to bypass the authentication procedure and gain unauthorized access to a vulnerable application with administrative privileges.

* References:
http://www.geeklog.net/article.php/geeklog-1.4.0sr3
http://www.securityfocus.com/archive/1/435295/30/0/threaded
http://www.frsirt.com/english/advisories/2006/2050
http://secunia.com/advisories/20316
http://kapda.ir/advisory-336.html

* Platforms Affected:
Geeklog versions 1.3.11 prior to 1.3.11sr6
Geeklog versions 1.4.x prior to 1.4.0sr3
Any operating system Any version
Recommendation Upgrade to the latest version of Geeklog (1.3.11sr6 or 1.4.0sr3 or later), available from the Geeklog Web site at http://www.geeklog.net/filemgmt/viewcat.php?cid=8
Related URL CVE-2006-2700 (CVE)
Related URL 18154 (SecurityFocus)
Related URL (ISS)