CVE-2018-5190

9.8 CRITICAL

📋 TL;DR

CVE-2018-5190 is an authentication bypass vulnerability in PicturesPro Photo Cart that allows remote attackers to access arbitrary customer accounts by modifying cookie values. This affects Photo Cart 6 and 7 installations before the 2018 security patch. Attackers can impersonate legitimate users and potentially access sensitive customer data.

💻 Affected Systems

Products:
  • PicturesPro Photo Cart
Versions: Versions 6 and 7 before Security-Patch-2018-B
Operating Systems: Any OS running the affected software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of Photo Cart 6 and 7 that have not applied the 2018 security patch. The vulnerability is in the core authentication mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all customer accounts, unauthorized access to sensitive personal information, financial data exposure, and potential privilege escalation to administrative functions.

🟠

Likely Case

Unauthorized access to customer accounts, viewing of private photos and order history, potential modification of customer data, and session hijacking.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but still represents a serious authentication bypass that violates privacy expectations.

🌐 Internet-Facing: HIGH - This vulnerability affects web applications directly exposed to the internet, allowing remote exploitation without authentication.
🏢 Internal Only: MEDIUM - While still exploitable internally, the attack surface is reduced compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves simple cookie manipulation without requiring authentication. The vulnerability is well-documented in public advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security-Patch-2018-B

Vendor Advisory: https://www.picturespro.com/support-forum/photo-cart/?t=38346-security-patch-for-photo-cart-2018

Restart Required: No

Instructions:

1. Download the Security-Patch-2018-B from PicturesPro support forum. 2. Apply the patch to affected Photo Cart installations. 3. Verify the patch was applied successfully by testing authentication mechanisms.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to detect and block cookie manipulation attempts targeting pc_head.php, pc_login.php, and pc_login_page.php endpoints.

Session Validation Enhancement

all

Implement additional server-side session validation to verify cookie integrity and prevent unauthorized modifications.

🧯 If You Can't Patch

  • Isolate the Photo Cart application behind a reverse proxy with strict session validation
  • Implement network segmentation to limit access to the vulnerable application

🔍 How to Verify

Check if Vulnerable:

Check if Photo Cart version is 6 or 7 and verify that Security-Patch-2018-B has not been applied. Test by attempting to modify authentication cookies to access other user accounts.

Check Version:

Check the Photo Cart administration panel or configuration files for version information.

Verify Fix Applied:

After applying the patch, test authentication mechanisms to ensure cookie manipulation no longer allows unauthorized account access. Verify that session validation is properly implemented.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login with unusual cookie values
  • Access to customer accounts from unexpected IP addresses
  • Requests to pc_head.php, pc_login.php, or pc_login_page.php with modified cookies

Network Indicators:

  • Unusual patterns of cookie manipulation in HTTP requests
  • Rapid succession of authentication attempts with varying cookie values

SIEM Query:

source="web_logs" AND (uri="/pc_head.php" OR uri="/pc_login.php" OR uri="/pc_login_page.php") AND cookie_changes>0

🔗 References

📤 Share & Export