exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

PSA05-003.txt

PSA05-003.txt
Posted Jan 12, 2005
Authored by Paul J Docherty

Portcullis Security Advisory - MediaPartner 5.0 has a logic flaw that allows the authentication mechanism to be bypassed.

tags | advisory
SHA-256 | 05088e775c9bc1cab5b434d2c2c98482abcb4b89534f2d9f790543be62b33c1e

PSA05-003.txt

Change Mirror Download
Portcullis Security Advisory

Vulnerable System:

MediaPartner 5.0

Vulnerability Title:

In Place Password Update Process Flawed

Vulnerability discovery and development:

Portcullis Security Testing Service

Affected systems:

Emotion MediaPartner Web Server Version 5.0 (5.1 not confirmed)

Details:

The logic behind the "In Place Password Update" process (which
appears to be used to force a user to change their password when it
has expired) can be exploited to change the password of any user,
without having to authenticate to the system or have knowledge of the
current password. This is caused by the fact that no checking is done
to ensure that a session has been authenticated before the change
password code is executed.

Impact:

This vulnerability allows the authentication mechanism to be
bypassed, by entering a valid username and resetting their password
to a known value. Once access was gained to the application
Portcullis were able to identify users with full admin privileges,
after resting their password, full control of the application was
gained.

Exploit:

No exploit required. Example: http://target_ip/login.bhtml?userNameForPasswordChange=admin

Copyright:

Copyright © Portcullis Computer Security Limited 2005, All rights reserved worldwide.
Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.

Disclaimer:

The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.




*************************************************************
The information in this email is confidential and may be
legally privileged. It is intended solely for the addressee.
Any opinions expressed are those of the individual and do not
represent the opinion of the organisation.
Access to this email by persons other than the intended
recipient is strictly prohibited.
If you are not the intended recipient, any disclosure, copying,
distribution or other action taken or omitted to be taken in
reliance on it, is prohibited and may be unlawful.
When addressed to our clients any opinions or advice contained
in this email is subject to the terms and conditions expressed
in the applicable Portcullis Computer Security Limited terms
of business.
**************************************************************
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close