First published: Wed Dec 21 2005(Updated: )
FlatNuke 2.5.6 verifies authentication credentials based on an MD5 checksum of the admin name and the hashed password rather than the plaintext password, which allows attackers to gain privileges by obtaining the password hash (possibly via CVE-2005-2813), then calculating the credentials and including them in the secid cookie.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Pnphpbb | =2.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4448 has been classified as a medium severity vulnerability.
To fix CVE-2005-4448, it's recommended to upgrade to FlatNuke version 2.5.7 or later.
CVE-2005-4448 affects FlatNuke version 2.5.6.
CVE-2005-4448 is an authentication bypass vulnerability due to improper handling of password hashes.
Yes, CVE-2005-4448 can be exploited remotely if an attacker obtains the password hash.