[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Anchor CMS 0.9.2 Header Injection Vulnerability

Author
Paulos Yibelo
Risk
[
Security Risk High
]
0day-ID
0day-ID-22851
Category
web applications
Date add
10-11-2014
Platform
php
Anchor CMS <= 0.9.2 (Current Version)

header injection

in anchor/models/comment.php

$headers  = 'MIME-Version: 1.0' . "\r\n";
$headers .= 'Content-type: text/html; charset=utf-8' . "\r\n";
$headers .= 'From: notifications@' . $_SERVER['HTTP_HOST'] . "\r\n";

49: mail($to, __('comments.notify_subject'), $message, $headers);

so it  is possible to inject arbitary "From" headers or any header
using CRLF. simply by tampering and changing the host to bad.com or
bad.com\r\nNew-Header:Hacked!

#  0day.today [2024-11-16]  #