TITLE: phpmyfamily User Authentication Bypass Vulnerability SECUNIA ADVISORY ID: SA11944 VERIFY ADVISORY: http://secunia.com/advisories/11944/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: phpmyfamily 1.x http://secunia.com/product/3619/ DESCRIPTION: Valerie Holfield has discovered a vulnerability in phpmyfamily, which can be exploited by malicious people to gain edit privileges. It is possible to be automatically logged in as user "nobody" when clicking to download a document and then leaving the page. This grants the person ability to add people, change information, upload and delete documents and images. Successful exploitation requires that "register_globals" is enabled. The vulnerability has been reported in version 1.3.0. Prior versions may also be affected. SOLUTION: Update to version 1.3.1. http://www.phpmyfamily.net/downloads.php PROVIDED AND/OR DISCOVERED BY: Valerie Holfield ORIGINAL ADVISORY: http://sourceforge.net/tracker/index.php?func=detail&aid=973962&group_id=110402&atid=656153 OTHER REFERENCES: OSVDB: http://www.osvdb.org/7252 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet@packetstormsecurity.org ----------------------------------------------------------------------