Geeklog lib-sessions.php Session Cookie Handling Administrative Bypass

Critical Nessus Network Monitor Plugin ID 3464


The remote host is vulnerable to a flaw that allows for the bypassing of authentication.


The remote host is running Geeklog, an open-source weblog powered by PHP and MySQL. The installed version of Geeklog is vulnerable to a flaw in the 'lib-sessions.php' script. Specifically, a remote attacker can use the script to bypass authentication and gain administrative access to the Geeklog application. Successful exploitation gives the attacker the ability to gather confidential data, the ability to compromise file integrity, and the ability to interrupt services to valid users.


Upgrade to version 1.3.11sr5, 1.3.9sr5, 1.4.0sr2, or higher.

See Also

Plugin Details

Severity: Critical

ID: 3464

Family: CGI

Published: 2006/03/07

Modified: 2016/01/19

Dependencies: 1442

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 9.8

Temporal Score: 9.1


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:geeklog:geeklog

Reference Information

CVE: CVE-2006-1069

BID: 17010