OpenPNE authentication bypass vulnerability


OpenPNE contains an authentication bypass vulnerability.

OpenPNE is an open source SNS (Social Networking Service) software. OpenPNE provides an "IP address range limitation" function to provide access to certain pages only to mobile devices. OpenPNE has an issue with the IP address range limitation function that may lead to an authentication bypass vulnerability. As a result, the "simple login" function for mobile phones may allow a remote attacker to bypass authentication.

Note that products are affected by this vulnerability only when mobile device support and IP address range limitation are both enabled.

According to the developer, in all versions of OpenPNE 1.6 and later, the IP adress range limitation function is either not implemented or not enabled by default. The developer has released information regarding this issue. For more information, refer to the information provided by the developer.

Hiromitsu Takagi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 5.8 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products

  • OpenPNE 2.13.2 to 2.14.4


A remote attacker may view or modify information stored by the product.

[Update the Software]
Update to the latest version according to the information provided by the developer.

Apply the workaround according to the information provided by the developer.
Vendor Information

  • OpenPNE Project : 4612 (Japanese)
CWE (What is CWE?)

  1. Permissions(CWE-264) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2010-1040

  1. JVN : JVN#06874657
  2. National Vulnerability Database (NVD) : CVE-2010-1040
  3. IPA SECURITY ALERTS : Security Alert for OpenPNE Vulnerability
  4. Secunia Advisory : SA38857
Revision History

  • [2010/03/12]
      Web page published