MRCGIGUY Products Cookie Handling Authentication Bypass Vulnerability


Description   A vulnerability has been identified in various MRCGIGUY products, which could be exploited by remote attackers to bypass security restrictions. This issue is caused by a design error in the administrative interface that relies on cookie data to authenticate users, which could be exploited by attackers to gain unauthorized administrative access to a vulnerable web application via a specially crafted cookie.
     
Vulnerable Products   Vulnerable Software:
MRCGIGUY ClickBank Directory version 1.0.1 and priorMRCGIGUY Hot Links SQL version 3.2.0 and priorMRCGIGUY Amazon Directory version 1.0 and priorMRCGIGUY Amazon Directory version 2.0 and priorMRCGIGUY Message Box version 1.0 and priorMRCGIGUY Message Box version 1.0 and priorMRCGIGUY Ultimate Profit Portal version 1.0.1 and priorMRCGIGUY SimpLISTic SQL version 2.0.0 and priorMRCGIGUY Top Sites version 1.0.0 and prior
     
Solution  
     
CVE  
     
References   http://www.milw0rm.com/exploits/8682
http://www.milw0rm.com/exploits/8684
http://www.milw0rm.com/exploits/8685
http://www.milw0rm.com/exploits/8686
http://www.milw0rm.com/exploits/8687
http://www.milw0rm.com/exploits/8688
http://www.milw0rm.com/exploits/8692
http://www.milw0rm.com/exploits/8694
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - POST : javascript code found in data
3.2.0
XSS - Prevention - POST : code allowing cookie access found in data
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - POST : 'script' tag found in data
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2009-05-15 

 Target Type 
Server 

 Possible exploit 
Local & Remote