BlogPHP 2.0 allows remote attackers to bypass authentication, and post (1) messages or (2) comments as an arbitrary user, via a modified blogphp_username field in a cookie.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/29133 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42372 | vdb entry |
http://secunia.com/advisories/30165 | third party advisory vendor advisory |
http://www.davidsopas.com/soapbox/blogphp.txt |