[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

TypeSetter CMS 5.1 - Host Header Injection Vulnerability

Author
Navina Asrani
Risk
[
Security Risk Low
]
0day-ID
0day-ID-29777
Category
web applications
Date add
13-02-2018
CVE
CVE-2018-6889
Platform
php
# Exploit Title: TypeSetter CMS 5.1 Host Header Injection
# Exploit Author: Navina Asrani
# Contact: https://twitter.com/NavinaSanjay
# Website: https://securitywarrior9.blogspot.in/
# Vendor Homepage: https://www.typesettercms.com/
# Version: 5.1
# CVE : NA
# Category: Webapp CMS
 
1. Description
 
The application allows illegitimate host header manipulation and leads to aribtary web page re-direction. This can also lead to severe attacks such as password reset or web cache poisoning
 
     
2. Proof of Concept
 
1. Visit the application
2. Tamper the request and change the host to any arbitrary header like google.com
3. The same is added in request and complete page re-direction takes place.
Exploitation Technique: A attacker can perform application modification to perform advanced attacks as as password reset/ cache poisoning etc.
Severity Level: High
Security Risk:
The presence of such a risk can lead to user cache poisoning and user re-direction
Exploit code:
 
GET / HTTP/1.1
Host: google.com
 
You can observe the page being re-directed and the Location header changed in response to: http://www.google.com/ 
    
3. Solution:
    
To Mitigate host header injections allows only a white-list of allowed host names.

#  0day.today [2024-11-15]  #