cijfer has discovered a vulnerability in Reamday Enterprises Magic News, which can be exploited by malicious people to bypass certain security restrictions.
Input passed to the "admin_password" parameter in "settings.php" isn't properly verified before being used to do a password comparison. This can be exploited to change the administrator's password by setting the "new_passwd" and "confirm_passwd" parameters to the new password.
Successful exploitation allows access to the administration section, but requires that "register_globals" is enabled.
The vulnerability has been confirmed in Magic News Lite 1.2.3 and has also been reported in Magic News Plus 1.0.3 and prior. Other versions may also be affected.
Solution: Restrict direct web access to the "settings.php" script (e.g. with .htaccess).
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com