TUCoPS :: Web :: CMS / Portals :: bt-30006.htm

e107 IP address spoofing
IP address spoofing in e107
IP address spoofing in e107

Vulnerability ID: HTB22343=0D
Reference: http://www.htbridge.ch/advisory/ip_address_spoofing_in_e107.html=0D 
Product: e107 Website System=0D
Vendor: e107=0D
Vulnerable Version: 0.7.19 and Probably Prior Versions=0D
Vendor Notification: 05 April 2010 =0D
Vulnerability Type: Application Logic Error=0D
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response=0D
Risk level: Low =0D
Credit: High-Tech Bridge SA (http://www.htbridge.ch/) =0D 
Vulnerability Details:=0D
An attacker can spoof his IP address in the system logs. Attacker can alter the X-Forwarded-For field and system will log this value as real. IP-bases filtering systems can be bypassed, fake or local IPs may be logged instead of the real. Vulnerability is critical for IP-based authentications.=0D
Attacker can use browser to exploit this vulnerability. The following PoC is available: =0D

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986- AOH