1st Feb 2002   [SBWID-5054]
	
COMMAND
	DCForum easily guessable users passwords
SYSTEMS AFFECTED
	DCForum version 6.22
PROBLEM
	Shimi posted :
	
	When a user requests a new password for his account, a new  password  is
	generated  and  sent  to  the   requester   (anyone   that   knows   the
	username+email  information,  which  is  usually  available  in   \"user
	profile\").
	
	The problem is that the password is simply the  first  6  characters  of
	the user\'s SessionID, which is, of course, known to anybody  who  knows
	how to see a value in a cookie.
	
	Hence every user in the world can come  to  the  board,  request  a  new
	password for someone, and then  login  with  that  username  +  6  first
	characters of the SessionID from the cookie.
	
	 Update (06 February 2002)
	 ======
	
	When registering a user and not allowing him to  choose  a  password,  a
	password is generated by the same algorithm as the algorithm  used  when
	creating new password for a user who lost it.
	
	Once again, the password is predictable, thus bypasses  all  limitations
	of using a valid mailbox for user registration  (user  can  use  a  fake
	E-Mail address, and still know his password)
	
	In Lib/user_register.pl:
	
	<snip>
	   if ($r_in->{\'command\'} eq \'register\') {
	
	</snip>
	<snip>
	      if ($r_setup->{\'auth_register_via_email\'} eq \'on\') {
	         my $session = get_session_id();
	         $r_in->{\'password\'} = substr($session,3,6);
	</snip>
	
SOLUTION
	See link below (patches both bugs) :
	
	http://www.dcscripts.com/bugtrac/DCForumID7/3.html
	
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH