[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wonder CMS 2.3.1 - Host Header Injection Vulnerability

Author
Samrat Das
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-29707
Category
web applications
Date add
05-02-2018
CVE
CVE-2017-14523
Platform
php
# Exploit Title: Wonder CMS 2.3.1 Host Header Injection
# Exploit Author: Samrat Das
# Contact: http://twitter.com/Samrat_Das93
# Website: https://securitywarrior9.blogspot.in/
# Vendor Homepage: https://www.wondercms.com/
# Version: 2.3.1
# CVE : CVE-2017-14523
# Category: Webapp CMS
 
1. Description
 
The application allows illegitimate host header manipulation and leads to aribtary web page re-direction. This can also lead to severe attacks such as password reset or web cache poisoning
 
  
    
2. Proof of Concept
 
Intercept any web request of cms using a proxy tool. 
Change the http host header to: 
POST / HTTP/1.1
Host: google.com
 
You can observe the page being re-directed and the Location header changed in response to: http://www.google.com/ 
    
3. Solution:
    
To Mitigate host header injections allows only a whitelist of allowed hostnames.

#  0day.today [2024-11-15]  #