source: https://www.securityfocus.com/bid/5347/info dotproject is prone to an issue which may allow remote attackers to bypass authentication and gain administrative access to the software. This may be accomplished by submitting a maliciously crafted 'user_cookie' value either manually or via manipulation of URI parameters. This problem is due to the software relying on the user 'cookie_value' to authenticate the user. curl -b user_cookie=1 http://server/project/index.php?m=projects or http://server/project/index.php?m=projects&user_cookie=1