In-Reply-To: <[EMAIL PROTECTED]>

>Received: (qmail 11401 invoked from network); 27 Feb
2003 16:13:51 -0000
>Received: from outgoing2.securityfocus.com (HELO
outgoing.securityfocus.com) (205.206.231.26)
>  by mail.securityfocus.com with SMTP; 27 Feb 2003
16:13:51 -0000
>Received: from lists.securityfocus.com
(lists.securityfocus.com [205.206.231.19])
>
by outgoing.securityfocus.com (Postfix) with QMQP
>
id EE0608F2AB; Thu, 27 Feb 2003 08:46:22 -0700 (MST)
>Mailing-List: contact [EMAIL PROTECTED];
run by ezmlm
>Precedence: bulk
>List-Id: <bugtraq.list-id.securityfocus.com>
>List-Post: <mailto:[EMAIL PROTECTED]>
>List-Help: <mailto:[EMAIL PROTECTED]>
>List-Unsubscribe:
<mailto:[EMAIL PROTECTED]>
>List-Subscribe:
<mailto:[EMAIL PROTECTED]>
>Delivered-To: mailing list [EMAIL PROTECTED]
>Delivered-To: moderator for [EMAIL PROTECTED]
>Received: (qmail 26239 invoked from network); 27 Feb
2003 07:19:07 -0000
>Date: 27 Feb 2003 07:14:24 -0000
>Message-ID:
<[EMAIL PROTECTED]>
>Content-Type: text/plain
>Content-Disposition: inline
>Content-Transfer-Encoding: binary
>MIME-Version: 1.0
>X-Mailer: MIME-tools 5.411 (Entity 5.404)
>From: Haluk AYDIN <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED]
>Subject: Ecardis Password Reseting Vulnerability
>
>
>
>Hi,
>
>I don't know if someone has discovered this before but
Ecartis 1.0.0 
>(former listar) contains a vulnerability that enables
an attacker to reset 
>passwords of any user defined on the list server,
including the list 
>admins. 
>
>After logging on as a non-priviledged user, Ecartis
enables the user to 
>change his/her password, but does not ask for the old
one. The first time 
>I have seen this, I thought that the software relies
on the session 
>cookie, but it seems this is not the case. 
>
>The html page contains the username in the "hidden"
fields. After saving 
>the page on disk, then replacing all "hidden" fields
with another username 
>which is defined in the server, and reloading the page
again we can try 
>our chance to change the password. Just fill in the
empty password fields 
>with a password of your choice, and click "Change
Password": there you 
>are... You have just reset the victim's password.
>
>I have not tested this on different versions, but I
guess it will work for 
>all of them. I would appreciate any comments on the issue.
>
>Regards,
>


Thank you for bringing this to our attention, it was
fixed only a few hours after recieving this.

The FreeBSD port (which I maintain) has also been updated

Please use snapshot versions after 20030227, and make
sure the FreeBSD port is update as well.

-Trish Lynch - ecartis core team. 

Reply via email to