---------------------------------------------------------------------- Use WSUS to deploy 3rd party patches Public BETA http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Website Baker Security Bypass Vulnerability SECUNIA ADVISORY ID: SA38747 VERIFY ADVISORY: http://secunia.com/advisories/38747/ DESCRIPTION: A vulnerability has been reported in Website Baker, which can be exploited by malicious people to bypass certain security restrictions. An error within the "print_error()" function in the framework/class.wb.php script can be exploited to e.g. impersonate a registered user. The vulnerability is reported in version 2.8.0. SOLUTION: Update to version 2.8.1. PROVIDED AND/OR DISCOVERED BY: The vendor credits Chio, Thorn, and Stefek. ORIGINAL ADVISORY: http://project.websitebaker2.org/browser/tags/2.8.1/CHANGELOG http://www.websitebaker2.org/forum/index.php/topic,15519.0.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------