Release date:
Updated on:
Affected Systems:
Zikula Application Framework 1.3.6 build 28
Description:
--------------------------------------------------------------------------------
CVE (CAN) ID: CVE-2014-2293
Zikula Application Framework is an open-source Application Framework.
Zikula Application Framework 1.3.6 build 28 has a security vulnerability that can be exploited to tamper with some data or control the affected system.
1. When "module" is set to "users", "func" is set to "register", "csrftoken" is set to a valid value, and "registration_info" is set to a valid value, the index is not properly filtered. the "authentication_method_ser" and "authentication_info_ser" POST parameter values of php are used to call the "unserialize ()" function.
To successfully exploit this vulnerability, you must enable user registration.
2. The "zikulaMobileTheme" cookie value in index. php is not properly filtered. It is used to call the "unserialize ()" function in the/lib/util/SecurityUtil. php script.
<* Source: Egidio Romano
Link: http://secunia.com/advisories/56274/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Zikula
------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://zikula.org/
Zikula:
Http://community.zikula.org/index.php? Module = News & amp; func = display & amp; sid = 3138