Secunia Security Advisory - Pouya_Server has reported a security issue in multiple i-dreams products, which can be exploited by malicious people to disclose sensitive information.
83153ad0a530f9503d54a04fe284aa31cf7c8c0597c7fe63568115e0d0ac78ac
----------------------------------------------------------------------
Did you know? Our assessment and impact rating along with detailed
information such as exploit code availability, or if an updated patch
is released by the vendor, is not part of this mailing-list?
Click here to learn more about our commercial solutions:
http://secunia.com/advisories/business_solutions/
Click here to trial our solutions:
http://secunia.com/advisories/try_vi/
----------------------------------------------------------------------
TITLE:
i-dreams Multiple Products "admin.dat" Information Disclosure
SECUNIA ADVISORY ID:
SA33993
VERIFY ADVISORY:
http://secunia.com/advisories/33993/
DESCRIPTION:
Pouya_Server has reported a security issue in multiple i-dreams
products, which can be exploited by malicious people to disclose
sensitive information.
The security issue is caused due to the "admin.dat" file being stored
with insecure permissions inside the web root. This can be exploited
to gain knowledge of sensitive information (e.g. administrator user
name and password) by requesting the file directly.
This security issue is reported in the following products:
- i-dreams Mailer version 1.2
- i-dreams GB Server 5.4
- i-dreams Guestbook 5.4
SOLUTION:
Restrict access to the "admin.dat" file (e.g. using a .htaccess
file).
PROVIDED AND/OR DISCOVERED BY:
Pouya_Server
ORIGINAL ADVISORY:
http://packetstorm.linuxsecurity.com/0902-exploits/idreamsmailer-disclose.txt
http://packetstorm.linuxsecurity.com/0902-exploits/idreamsgbserv-disclose.txt
http://packetstorm.linuxsecurity.com/0902-exploits/idreamsgb-disclose.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------