TITLE: VHCS Security Issue and Multiple Vulnerabilities SECUNIA ADVISORY ID: SA18799 VERIFY ADVISORY: http://secunia.com/advisories/18799/ CRITICAL: Moderately critical IMPACT: Security Bypass, Cross Site Scripting, Privilege escalation WHERE: >From remote SOFTWARE: VHCS 2.x http://secunia.com/product/4489/ DESCRIPTION: Román Medina-Heigl Hernández has reported some vulnerabilities in VHCS, which can be exploited by malicious people to conduct script insertion attacks, and by malicious users to bypass certain security restrictions and gain escalated privileges. 1) Input passed to the username field in the login page isn't sanitised before being stored in the admin log. This can be exploited to execute arbitrary HTML and script code in the Administrators' browser session in context of an affected website when the Administrator views the log in the "Admin Log" functionality. The vulnerability has been reported in version 2.4.6.2 and 2.4.7.1. Prior versions may also be affected. 2) The gui/admin/change_password.php script does not validate user's current password before allowing the password to be changed. The security issue has been reported in version 2.4.6.2 and 2.4.7.1. Prior versions may also be affected. 3) The "check_login()" function in gui/include/login.php does not properly terminate the script when user session validation fails. This can be exploited to bypass session validation in certain scripts such as admin/add_user.php, which may be exploited to added admin users. The vulnerability has been reported in version 2.4.6.2 and 2.4.7.1. Prior versions may also be affected. 4) The gui/admin/add_user.php script does not validate user's rights before allowing admin users to be added. This may be exploited by less privileged users to add new admin user to the system. The vulnerability has been reported in version 2.4.6.2 and 2.4.7.1. Prior versions may also be affected. SOLUTION: Apply Security Patch 2006-02-09. http://vhcs.net/new/modules/news/article.php?storyid=25 Note: This does not fix #2 and #4. PROVIDED AND/OR DISCOVERED BY: Román Medina-Heigl Hernández ORIGINAL ADVISORY: http://www.rs-labs.com/adv/RS-Labs-Advisory-2006-1.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------