TITLE: Wimpy MP3 Player trackme.txt File Modification Weakness SECUNIA ADVISORY ID: SA18900 VERIFY ADVISORY: http://secunia.com/advisories/18900/ CRITICAL: Not critical IMPACT: Manipulation of data WHERE: >From remote SOFTWARE: Wimpy MP3 Player 5.x http://secunia.com/product/8102/ DESCRIPTION: ReZEN has reported a weakness in Wimpy MP3 Player, which can be exploited by malicious people to modify certain data. The weakness is caused due to wimpy_trackplays.php failing to authenticate users before allowing access. This can be exploited to write arbitrary contents into the "trackme.txt" file, which may facilitate other attacks on the system. Successful exploitation requires that the web server process has write access to the "trackme.txt" file. SOLUTION: Change the file permissions of the "trackme.txt" file to prevent modification or remove wimpy_trackplays.php if it is not required. PROVIDED AND/OR DISCOVERED BY: ReZEN ORIGINAL ADVISORY: http://www.xorcrew.net/xpa/XPA-WimpyMP3Player.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------