Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered a security issue in Text Rider, which can be exploited by malicious people to disclose sensitive information and potentially compromise a vulnerable system.
f6318fac5aeeabd51863a424428a381c65e728ed62f5b07d396bf93eb3608e09
TITLE:
Text Rider Exposure of User Credentials
SECUNIA ADVISORY ID:
SA18605
VERIFY ADVISORY:
http://secunia.com/advisories/18605/
CRITICAL:
Highly critical
IMPACT:
Exposure of sensitive information, System access
WHERE:
>From remote
SOFTWARE:
Text Rider 2.x
http://secunia.com/product/6958/
DESCRIPTION:
Aliaksandr Hartsuyeu has discovered a security issue in Text Rider,
which can be exploited by malicious people to disclose sensitive
information and potentially compromise a vulnerable system.
The problem is that user credentials are stored in the
"data/userlist.txt" file inside the web root. This can be exploited
to disclose usernames and encrypted passwords.
This can further be exploited to access the administration section
(cookie-based authentication uses encrypted passwords) where
arbitrary files can be uploaded to a location inside the web root. It
is also possible to edit config.php and insert arbitrary PHP code.
The security issue has been confirmed in version 2.4. Other versions
may also be affected.
SOLUTION:
Restrict web access to the "data" directory (e.g. with a .htaccess
file).
PROVIDED AND/OR DISCOVERED BY:
Aliaksandr Hartsuyeu
ORIGINAL ADVISORY:
http://evuln.com/vulns/46/summary.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------