classes/session/cc_admin_session.php in CubeCart 4.3.4 does not properly restrict administrative access permissions, which allows remote attackers to bypass restrictions and gain administrative access via a HTTP request that contains an empty (1) sessID (ccAdmin cookie), (2) X_CLUSTER_CLIENT_IP header, or (3) User-Agent header.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.acunetix.com/blog/websecuritynews/cubecart-4-session-management-bypass-leads-to-administrator-access/ | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/54062 | vdb entry |
http://www.securitytracker.com/id?1023120 | vdb entry exploit |
http://www.vupen.com/english/advisories/2009/3113 | patch vendor advisory vdb entry |
http://www.securityfocus.com/archive/1/507594/100/0/threaded | mailing list |
http://forums.cubecart.com/index.php?showtopic=39691?read=1 | |
http://forums.cubecart.com/index.php?showtopic=39748 | patch |
http://secunia.com/advisories/37197 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/36882 | vdb entry exploit |