SQL-Ledger 2.4.4 up to and including 2.6.17 authenticates users by verifying that the value of the sql-ledger-[username] cookie matches the value of the sessionid parameter, which allows remote malicious users to gain access as any logged-in user by setting the cookie and the parameter to the same value.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sql-ledger sql-ledger 2.6.16 |
||
sql-ledger sql-ledger 2.4.5 |
||
sql-ledger sql-ledger 2.6.6 |
||
sql-ledger sql-ledger 2.6.11 |
||
sql-ledger sql-ledger 2.4.7 |
||
sql-ledger sql-ledger 2.6.1 |
||
sql-ledger sql-ledger 2.6.15 |
||
sql-ledger sql-ledger 2.4.8 |
||
sql-ledger sql-ledger 2.6.9 |
||
sql-ledger sql-ledger 2.6.0 |
||
sql-ledger sql-ledger 2.6.12 |
||
sql-ledger sql-ledger 2.6.3 |
||
sql-ledger sql-ledger 2.4.9 |
||
sql-ledger sql-ledger 2.6.17 |
||
sql-ledger sql-ledger 2.4.4 |
||
sql-ledger sql-ledger 2.6.14 |
||
sql-ledger sql-ledger 2.4.6 |
||
sql-ledger sql-ledger 2.4.10 |
||
sql-ledger sql-ledger 2.4.13 |
||
sql-ledger sql-ledger 2.6.4 |
||
sql-ledger sql-ledger 2.4.16 |
||
sql-ledger sql-ledger 2.6.7 |
||
sql-ledger sql-ledger 2.4.14 |
||
sql-ledger sql-ledger 2.4.15 |
||
sql-ledger sql-ledger 2.4.12 |
||
sql-ledger sql-ledger 2.6.2 |
||
sql-ledger sql-ledger 2.4.11 |
||
sql-ledger sql-ledger 2.6.10 |
||
sql-ledger sql-ledger 2.6.8 |
||
sql-ledger sql-ledger 2.6.5 |
||
sql-ledger sql-ledger 2.6.13 |