ZoRLu has reported a vulnerability in Joovili, which can be exploited by malicious people to bypass certain security restrictions.
The vulnerability is caused due to the application allowing access to the admin interface by checking if certain cookies exist. This can be exploited to gain administrative access to the application by creating the cookies "session_admin_id" with the value "1", "session_admin_username" with the value "admin", and "session_admin" with the value "true".
This vulnerability is reported in version 3.1.4. Other versions may also be affected.
Solution: Ensure that proper access restrictions are implemented.
Provided and/or discovered by: ZoRLu
Original Advisory: http://milw0rm.com/exploits/6955
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com