DCForum CGI could allow a remote attacker to recover user passwords
|dcforum-cgi-recover-passwords (8044)||Medium Risk|
DCForum could allow a remote attacker to obtain other user's passwords, caused by a vulnerability in the retrieve_password.pl script. A remote attacker could request a new password for another user's account, which would be the first 6 characters of the user's session ID, and then log onto DCForum as another user.
Apply the patch for this vulnerability, as listed in DCForum Security Bulletin - Topic #3. See References.
- BugTraq Mailing List, Fri Feb 01 2002 - 06:15:44 CST: Vulnerability in all versions of DCForum from dcscripts.com.
- BugTraq Mailing List, Sat Feb 02 2002 - 10:32:43 CST: And another (same) bug in DCForum at user registration process (dcscripts.com).
- DCForum Bug Report Topic #1198: Severe Security Violation - Latest DCForum.
- DCForum Security Bulletin - Topic #3: Jan 31, 2002 - security advisory.
- BID-4014: DCForum Predictable Password Generation Vulnerability
- CVE-2002-0226: retrieve_password.pl in DCForum 6.x and 2000 generates predictable new passwords based on a sessionID, which allows remote attackers to request a new password on behalf of another user and use the sessionID to calculate the new password for that user.
- OSVDB ID: 2038: DCForum retrieve_password.pl Predictable Password
- OSVDB ID: 3866: DCForum user_register.pl Predictable Password
- DCScripts DCForum 2000 1.0
Jan 31, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this