Posts

Showing posts with the label CVE IDs and 0 day research

Malicious File Upload- Intex Router N-150 | CVE-2018-12528

Image
By- Navina Asrani Hi Readers, Recently while tinkering with my wifi router, I was curious to find if it has possible loopholes and vulnerabilities. Curious to explore its functionalities, I started probing with the options. Title of the Vulnerability:   Malicious File Upload Vulnerability Class: Firmware Compromise/ File Upload Technical Details & Description: The firmware allows malicious files to be uploaded without any checking of extensions and allows filed to be uploaded. CVE ID allocated: - CVE-2018-12528 Product & Service Introduction: InteX Router Steps to Re-Produce – 1.        Visit the application 2.         Go to the advanced settings post login 3.        Under backup- restore page upload any random file extension and hit go. 4.        Upon the file being upload, the firmware will get rebooted accepting the arbitrary file. Exploitation Technique: A attacker can upload malicious files to compromise the firmware. Severity

Cross Site Request Forgery- Intex Router N-150 | CVE-2018-12529

Image
By- Navina Asrani Hi Readers, Recently while tinkering with my wifi router, I was curious to find if it has possible loopholes and vulnerabilities. Curious to explore its functionalities, I started probing with the options. Title of the Vulnerability:   Cross Site Request Forgery Vulnerability Class: Code Execution/ Privilege Escalation Technical Details & Description: The firmware allows malicious request to be executed without verifying source of request. This leads to arbitrary execution with malicious request which will lead to the creation of a privileged user. CVE ID allocated: -  CVE-2018-12529 Product & Service Introduction: Intex Router Steps to Re-Produce – 1.        Visit the application 2.         Go to any router setting modification page and change the values, create a request and observe the lack of CSRF tokens. 3.        Craft an html page with all the details for the built-in admin user creation and host it on a server

Cross Site Request Forgery- Frog CMS CVE ID : CVE-2018-8908

Image
Cross Site Request Forgery- Frog CMS By- Samrat Das Hi Readers, Recently while performing some open source security assessment, I came across an CMS Application, “Frog CMS” . Curious to explore its functionalities, I set up a local copy and started playing around to find security vulnerabilities’. Title of the Vulnerability :  Cross Site Request Forgery Vulnerability Class : Code Execution/ Privilege Escalation Technical Details & Description : The application source code is coded in a way which allows malicious HTML request to be executed without veryifying source of request.This leads to arbitary execution with malicous request which will lead to the creation of a privileged user. CVE ID allocated : -  CVE-2018-8908 Product & Service Introduction : Frog CMS Steps to Re-Produce – 1.       Visit the application 2.       Visit the Add Users Page. 3.       Craft an html page with all the details for an admin user creation and host it on a server 4.       

HTML Injection- October CMS - CVE-2018-7198

Image
HTML Injection- October CMS By- Samrat Das Hi Readers, Recently while performing some open source security assessment, I came across an CMS Application, “October CMS” . Curious to explore its functionalities, I set up a local copy and started playing around to find security vulnerabilities’.   Title of the Vulnerability :   HTML Injection. Vulnerability Class : Code Execution/ Information Stealing Technical Details & Description : The application source code is coded in a way which allows malicious HTML commands to be executed in the inner pages which can lead to execution of arbitrary code. CVE ID allocated :  -   CVE-2018-7198 Product & Service Introduction : October CMS Steps to Re-Produce – 1.        Visit the application 2.        Visit the Add Posts Page. 3.          Goto edit function and add any html payload, it gets saved and executed further in web page. Exploitation Technique : A attacker can perform application defacing

Cross Site Request Forgery- Front Accounting ERP 2.4.3 - CVE-2018-7176

Image
Cross Site Request Forgery- Front Accounting ERP 2.4.3 By- Samrat Das Hi Readers, Recently while performing some open source security assessment, I came across an ERP Application- Front Accounting . Curious to explore its functionalities, I set up a local copy and started playing around to find security vulnerabilities’.   Title of the Vulnerability :   Cross Site Request Forgery. Vulnerability Class : Remote Code Execution/ Account takeover Technical Details & Description : The application source code is coded in a way which allows malicious crafted HTML page to be executed directly without any anti csrf countermeasures. CVE ID allocated :    CVE-2018-7176 Product & Service Introduction : Front Accounting 2.4.3 Steps to Re-Produce – 1.        Visit the application 2.        Visit the User Permissions Page. 3.          Goto add user, and create a csrf crafted exploit for the same , upon hosting it on a server and sending the link to cl

Cross Site Request Forgery- Type Setter CMS 5.1-CVE-2018-6888

Image
Hi Readers, Recently while performing some open source security assessment, I came across an CMS “ Typesetter” CMS. Curious to explore its functionalities, I set up a local copy and started playing around to find security vulnerabilities’.   Title of the Vulnerability :   Cross Site Request Forgery. Vulnerability Class : Remote Code Execution/ Account takeover Technical Details & Description : The application source code is coded in a way which allows malicious crafted HTML page to be executed directly without any anti csrf countermeasures. CVE ID allocated :   CVE-2018-6888 Product & Service Introduction : TypeSetter 5.1 Steps to Re-Produce – 1.        Visit the application 2.        Visit the User Permissions Page. 3.          Goto add user, and create a csrf crafted exploit for the same , upon hosting it on a server and sending the link to click by victim, it gets exploited. Exploitation Technique: A attacker can perform application modi

Host Header Injection- Type Setter CMS 5.1 - CVE-2018-6889

Image
Hi Readers, Recently while performing some open source security assessment, I came across an CMS “ Typesetter” CMS. Curious to explore its functionalities, I set up a local copy and started playing around to find security vulnerabilities’.   Title of the Vulnerability :   Host Header Injection. Vulnerability Class : Injection Technical Details & Description: The application is configured to allow insecure host headers to be injected in request headers. CVE ID allocated :   CVE-2018-6889 Product & Service Introduction : TypeSetter 5.1 Steps to Re-Produce – 1.        Visit the application 2.        Tamper the request and change the host to any arbitrary header like google.com 3.         The same is added in request and complete page re-direction takes place. Exploitation Technique: A attacker can perform application modification to perform advanced attacks as as password reset/ cache poisoning etc. Severity Level: High Security Risk: The pres

Stored XSS in Wonder CMS- CVE-2017-14522

Image
By- Samrat Das Hi Readers Recently in one of my pentest research, I found a CMS " WonderCMS" hosted in github. Curious to explore its functionalities, I downloaded and set it up in my local system. After fiddling with the source code, I found that it did not have any kind of security mechanism to filter any user input and accepted and stored in blindly without any sort of input validation Title of the Vulnerability:   Stored XSS Common Vulnerability Scoring System:  7.0 Vulnerability Class:  Injection Technical Details & Description:  The application source code is coded in a way which allows user input values to be stored and processed by the application. CVE ID allocated :  CVE-2017-14522 Product & Service Introduction:  Wonder CMS 2.3.1 WonderCMS is an open source CMS (Content Management System) built with PHP, jQuery, HTML and CSS (Bootstrap responsive). WonderCMS doesn't require any configuration and can be simply unzipped a

Host Header Injection In Wonder CMS - CVE-2017-14523

Image
By- Samrat Das Hi Readers Recently in one of my pentest research, I found a CMS " WonderCMS" hosted in github. Curious to explore its functionalities, I downloaded and set it up in my local system. After fiddling with the source code, I found that it did not have any kind of security mechanism to filter the host redirections based on the HTTP header. Using this it became possible to perform host header injection attack. Title of the Vulnerability:   Host Header Injection Common Vulnerability Scoring System:  7.0 Vulnerability Class:  Injection Technical Details & Description:  The application source code is coded in a way which allows arbitrary host header to be defined leading to redirection/ user url manipulation CVE ID allocated :  CVE-2017-14523 Product & Service Introduction:  Wonder CMS 2.3.1 WonderCMS is an open source CMS (Content Management System) built with PHP, jQuery, HTML and CSS (Bootstrap responsive). WonderCMS doesn&#

Arbitrary file upload and RCE in Wonder CMS - CVE-2017-14521

Image
By- Samrat Das Hi Readers Recently in one of my pentest research, I found a CMS " WonderCMS" hosted in github. Curious to explore its functionalities, I downloaded and set it up in my local system. After fiddling with the source code, I found that it did not have any kind of file upload security mechanism and allowed the user to upload any file type! After reporting it to them, I did not receive any security relevant response, hence decided to publish a blog on this. Title of the Vulnerability:   Arbitrary File Upload Vulnerability Class: Security Misconfiguration Technical Details & Description: The application source code is coded in a way which allows arbitrary file extensions to be uploaded. This leads to uploading of remote shells/ malicious Trojans which can lead to complete system compromise and server takeover. CVE ID allocated :  CVE-2017-14521 Product & Service Introduction: Wonder CMS 2.3.1 WonderCMS is an open source CMS (Content Ma