wowondersocial user account hijacking

2016.10.15
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: wowondersocial user account hijacking # Exploit Author: Al-mamon rasool abdali hussain # Vendor Homepage: http://www.wowonder.com # Version: All # Tested on: linux the Vulnerability in login system that create predictable user id and send its over session when try to check user access the system will check using these session id in file assets/includes/functions_one.php line 86 the function ============================================================================ function Wo_CreateLoginSession($user_id = 0) { global $sqlConnect; if (empty($user_id)) { return false; } $time = strtotime("2 days ago"); $user_id = Wo_Secure($user_id); $hash = sha1(rand(111111111, 999999999)) . md5(microtime()) . rand(11111111, 99999999) . md5(rand(5555, 9999)); $query_one = mysqli_query($sqlConnect, "DELETE FROM " . T_APP_SESSIONS . " WHERE `user_id` = '{$user_id}' AND `platform` = 'web' AND `time` < $time"); $query_two = mysqli_query($sqlConnect, "DELETE FROM " . T_APP_SESSIONS . " WHERE `session_id` = '{$hash}'"); if ($query_two) { $query_three = mysqli_query($sqlConnect, "INSERT INTO " . T_APP_SESSIONS . " (`user_id`, `session_id`, `platform`, `time`) VALUES('{$user_id}', '{$hash}', 'web', " . time() . ")"); if ($query_three) { return $hash; } } } ============================================================================= the id is created in $hash = sha1(rand(111111111, 999999999)) . md5(microtime()) . rand(11111111, 99999999) . md5(rand(5555, 9999)); these id sent over session and also been stored as cookies used to verify the user identity in all the system the exploit is to use social engineering and make the target user login in specific time then do brute force for the rand values and already rand function has been exploited from long time and its value can be predicated in some cases


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top