Overview
Slash-based bulletin boards contain a vulnerability that may cause users to disclose their username and password to third-party sites.
Description
As described in the Slashcode FAQ, "Slash is a database-driven news and message board, using Perl, Apache and MySQL." Slash allows web site maintainers to create a custom bulletin board site using the same technology as the popular website Slashdot. Slash-based bulletin boards provide a "quick login" feature that allows users to bookmark a pre-formatted URL containing their account username and password. For users who are either unable or unwilling to store their session information in a cookie, this feature allows logins without the need to type a username and password. However, because the authentication information is contained within the URL, it may be disclosed to other sites. In particular, when users visit a link from the bulletin board to an external site, their login information may be passed via the HTTP Referer header. |
Impact
This vulnerability causes bulletin board account information to be disclosed in HTTP GET requests and Referer headers. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
Use session cookies |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported to the Bugtraq mailing list by Michal Zalewski.
This document was written by Jeffrey P. Lanza.
Other Information
CVE IDs: | None |
Severity Metric: | 1.35 |
Date Public: | 2002-09-11 |
Date First Published: | 2002-09-20 |
Date Last Updated: | 2003-02-06 18:43 UTC |
Document Revision: | 12 |