The "remember me" functionality in login.php in Burden before 1.8.1 allows remote attackers to bypass authentication and gain privileges by setting the burden_user_rememberme cookie to 1.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.exploit-db.com/exploits/30916 | third party advisory vdb entry exploit |
https://github.com/joshf/Burden/commit/edaa1bb8f73d6f3c8b2e78b67f1b40e02fccd0c1 | third party advisory patch |
https://github.com/joshf/Burden/issues/2 | patch third party advisory issue tracking |
http://www.securityfocus.com/archive/1/530703/100/0/threaded | broken link mailing list third party advisory vdb entry |
https://github.com/joshf/Burden/releases/tag/1.8.1 | third party advisory release notes |
https://www.htbridge.com/advisory/HTB23192 | broken link |