admin/index.php in Maian Guestbook 3.2 and earlier allows remote attackers to bypass authentication and gain administrative access by sending an arbitrary gbook_cookie cookie.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/6061 | exploit |
http://secunia.com/advisories/31070 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/30203 | vdb entry exploit |
http://www.maianscriptworld.co.uk/free-php-scripts/maian-guestbook/development/index.html |