glFusion before 1.1.3 performs authentication with a user-provided password hash instead of a password, which allows remote attackers to gain privileges by obtaining the hash and using it in the glf_password cookie, aka "User Masquerading." NOTE: this can be leveraged with a separate SQL injection vulnerability to steal hashes.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/8347 | exploit |
http://retrogod.altervista.org/9sg_glfuso_sql_cookies.html | exploit |
http://secunia.com/advisories/34575 | third party advisory vendor advisory |
http://marc.info/?l=bugtraq&m=123877379105028&w=2 | exploit mailing list |
http://www.glfusion.org/article.php/glfusion113 | patch vendor advisory |
http://www.glfusion.org/wiki/doku.php?id=glfusion:whatsnew | vendor advisory |