Published:2010/03/05  Last Updated:2010/03/12

JVN#06874657
OpenPNE authentication bypass vulnerability

Overview

OpenPNE contains an authentication bypass vulnerability.

Products Affected

  • OpenPNE 2.13.2 to 2.14.4
Note that products are affected by this vulnerability only when mobile device support and IP address range limitation are both enabled.

Description

OpenPNE is an open source SNS (Social Networking Service) software. OpenPNE provides an "IP address range limitation" function to provide access to certain pages only to mobile devices. OpenPNE has an issue with the IP address range limitation function that may lead to an authentication bypass vulnerability. As a result, the "simple login" function for mobile phones may allow a remote attacker to bypass authentication.

Impact

A remote attacker may view or modify information stored by the product.

Solution

Update the Software
Update to the latest version according to the information provided by the developer.

Workarounds
Apply the workaround according to the information provided by the developer.

Vendor Status

Vendor Status Last Update Vendor Notes
OpenPNE Project Vulnerable 2010/03/05

References

  1. IPA
    Security Alert for Vulnerability in OpenPNE

JPCERT/CC Addendum

According to the developer, in all versions of OpenPNE 1.6 and later, the IP adress range limitation function is either not implemented or not enabled by default. The developer has released information regarding this issue. For more information, refer to the information provided by the developer.

Vulnerability Analysis by JPCERT/CC

Analyzed on 2010.03.05

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required None - the vulnerability can be exploited without an honest user taking any action
  • High
Exploit Complexity Low-Medium - some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
  • Medium-High

Description of each analysis measures

Credit

Hiromitsu Takagi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2010-1040
JVN iPedia JVNDB-2010-000006

Update History