{"vuid":"VU#162723","idnumber":"162723","name":"x_news allows unauthorized users to access administrative menu","keywords":["x_news","unauthorized user","administrative menu","admin"],"overview":"x_news allows a user to authenticate without supplying the user's plaintext password.","clean_desc":"x_news is a system for managing news. When a user logs in to x_news version 1.1 using a plaintext password, x_news hashes the password with MD5 and compares it to user's hash stored in the file named \"db/users.txt\". If they match, x_news sets a cookie that contains the username and the hashed password. On subsequent transactions, x_news will accept this cookie as valid authentication. As a result, an attacker does not need to know a user's plaintext password. All that is needed is the user's MD5-hashed password, which can be found in the db/users.txt file.","impact":"Attackers can gain access to a user's account by using password data stored in a file, bypassing proper authentication by plaintext password.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Thanks to frog frog for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["http://www.ifrance.com/kitetoua/tuto/x_holes.txt","http://www.securityfocus.com/bid/4283"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-04-19T21:29:49Z","publicdate":"2002-03-12T00:00:00Z","datefirstpublished":"2002-09-16T21:52:00Z","dateupdated":"2002-12-10T23:10:13Z","revision":8,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"6","cam_easeofexploitation":"16","cam_attackeraccessrequired":"10","cam_scorecurrent":"3.6","cam_scorecurrentwidelyknown":"4.5","cam_scorecurrentwidelyknownexploited":"8.1","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.6,"vulnote":null}