ragnarok-bypass.txt
Posted on 01 September 2007
VaLiuS has reported a vulnerability in Ragnarok Online Control Panel, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error in the authentication process when checking page access. This can be exploited to bypass the authentication process via a specially crafted URL with an appended non-restricted page. The /.../ reffers to directory crawling Example: http://www.example.com/CP/...../account_manage.php/login.php Successful exploitation requires that files are served from an Apache HTTP server. The vulnerability has been reported in version 4.3.4a. Other versions may also be affected. SOLUTION: Edit the source code to ensure that the authentication process is properly performed. PROVIDED AND/OR DISCOVERED BY: Calypso Steweren