DigiLIBE Management Console 3.4 Execution After Redirect

2013.01.23
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-200


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

Product: DigiLIBE Management Console Vendor: Digitiliti Version: < 3.4 - ? Tested Version: 3.4 Vendor Notified Date: October 09, 2012 Release Date: January 18, 2013 Risk: High Authentication: None required Remote: Yes Description: Execution After Redirect vulnerabilities exist in DigiLIBE Management Console versions 3.4 and possibly other versions. This allows remote attackers to retrieve sensitive data that should only be returned to authenticated users. By not properly terminating the code after redirection an unauthenticated attacker can choose to not follow the redirect and view the normally protected content. Successful exploitation of this vulnerability resulted obtaining the contents of the 'General Configuration'. Exploit steps for proof-of-concept: 1. Using a proxy such as Burp Proxy intercept request: https://vulnerablehost.com/configuration/general_configuration.html 2. Send to repeater. 3. View response. Vendor Notified: Yes Vendor Response: November 11, 2012 - Deployed security update. Version not confirmed. Reference: CVE-2013-1402 http://cs.ucsb.edu/~bboe/public/pubs/fear-the-ear-ccs2011.pdf https://www.owasp.org/index.php/Execution_After_Redirect_(EAR) Credit: Robert Gilbert HALOCK Security Labs

References:

http://cs.ucsb.edu/~bboe/public/pubs/fear-the-ear-ccs2011.pdf
https://www.owasp.org/index.php/Execution_After_Redirect_(EAR
)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top