Portix-PHP 0.4 - Cookie Manipulation

EDB-ID:

21279

CVE:



Author:

frog

Type:

webapps


Platform:

PHP

Date:

2002-02-04


source: https://www.securityfocus.com/bid/4041/info

Portix-PHP is freely available web portal software. It is written in PHP and will run on most Unix and Linux variants.

Portix-PHP uses non-expiring cookies for session management. It is possible for a malicious user to manipulate values in their cookie to gain access to administrative pages on the web portal.

Successful hijacking of the administrative account will permit the malicious user to access all of the web portal's administrative facilities.

Change the values in the stored cookie to the following:

name=access value=ok