Yerba SACphp 6.3 and earlier allows remote attackers to bypass authentication and gain administrative access via a galleta[sesion] cookie that has a value beginning with 1:1: followed by a username.
- http://securityreason.com/securityalert/4883
- https://www.exploit-db.com/exploits/6691
No PoCs found on GitHub currently.