Aliaksandr Hartsuyeu has discovered a security issue in Text Rider, which can be exploited by malicious people to disclose sensitive information and potentially compromise a vulnerable system.
The problem is that user credentials are stored in the "data/userlist.txt" file inside the web root. This can be exploited to disclose usernames and encrypted passwords.
This can further be exploited to access the administration section (cookie-based authentication uses encrypted passwords) where arbitrary files can be uploaded to a location inside the web root. It is also possible to edit config.php and insert arbitrary PHP code.
The security issue has been confirmed in version 2.4. Other versions may also be affected.
Solution: Restrict web access to the "data" directory (e.g. with a .htaccess file).
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Text Rider Exposure of User Credentials
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.