PHProjekt Login Bypass Vulnerability

This issue may be exploited with a web browser. The following example was submitted:

http://www.somehost.com/phprojekt/mail/mail_send.php/sms

where the extraneous "sms" is included to be passed to the $PHP_SELF variable as part of the PATH_INFO. This causes PHPProjekt to behave as though the attacker accessing the script is logged on to PHPProjekt as a legitimate user.


 

Privacy Statement
Copyright 2010, SecurityFocus