Forum Thread: EQdkp Backup Referer Security Bypass

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:

See the original Secunia advisory:
EQdkp Backup Referer Security Bypass

Secunia EQdkp Backup Referer Security Bypass
Secunia Official 12th May, 2014 10:28
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
Eight10 has discovered a vulnerability in EQdkp, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information and manipulate data.

An insecure authentication method in admin/backup/backup.php and admin/backup/index.php can be exploited to bypass authentication by passing a "Referer" HTTP header with a URL from the Administration Panel.

Successful exploitation allows retrieving and editing data from arbitrary databases and database tables, e.g. changing an administrator's password hash.

The vulnerability is confirmed in version 1.3.1. Other versions may also be affected.

swallmann RE: EQdkp Backup Referer Security Bypass
Member 12th May, 2014 10:28
Score: 0
Posts: 3
User Since: 12th May 2014
System Score: N/A
Location: DE
Last edited on 12th May, 2014 10:33
This error is fixed in the 0.x branch of Eqdkp-Plus. We recommend users using the vanilla eqdkp to switch over to eqdkp-plus
Was this reply relevant?