Hello everybody,
Today I could my first post in english. These are a vulnerability open redirect at CMS of Russian origin. From Russia with Love ;)
Description:
URL: mysite.com/forum/away.php?s=
Affected Component: /forum/away.php?s=
Vulnerability Type:
Vulnerability Open Redirect https://cwe.mitre.org/data/definitions/601.html
Vendor of Product:
LogicBoard CMS
Version:
3.0, 4.0, 4.1
Attack Type:
Remote
Impact:
A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance.
Attack Vectors: s= Infection from malware and phishing attack.
About:
Attack Vectors: s= Infection from malware and phishing attack.
About:
LogicBoard CMS: It's a CMS oriented forums engines, ideal for corporate sites, online shops, communities and so on.
Credits:
These vulnerabilities have been discovered by
Francisco Javier Santiago Vázquez aka "n0ipr0cs"
https://es.linkedin.com/in/francisco-javier-santiago-v%C3%A1zquez-1b654050
These vulnerabilities have been discovered by
Francisco Javier Santiago Vázquez aka "n0ipr0cs"
https://es.linkedin.com/in/francisco-javier-santiago-v%C3%A1zquez-1b654050
https://twitter.com/n0ipr0cs
Disclosure Timeline:
Agust 28, 2016: Vulnerability acquired by Francisco Javier Santiago
Vázquez. aka "n0ipr0cs".
29 Agust, 2016 Responsible disclosure to Babylon Security Team.
30 Agust, 2016 Responsible disclosure to Babylon Security Team.
31 Agust, 2016 Responsible disclosure to Babylon Security Team.
03 January, 2017 Forward mail, please let me know when the vulnerability be solved in order to publish it.
31 January, 2017 Disclosure.
Sample for proof of concept web site: http://burgman-club.ru/forum /away.php?s=https://www.exploit-db.com/
Disclosure Timeline:
Agust 28, 2016: Vulnerability acquired by Francisco Javier Santiago
Vázquez. aka "n0ipr0cs".
29 Agust, 2016 Responsible disclosure to Babylon Security Team.
30 Agust, 2016 Responsible disclosure to Babylon Security Team.
31 Agust, 2016 Responsible disclosure to Babylon Security Team.
03 January, 2017 Forward mail, please let me know when the vulnerability be solved in order to publish it.
31 January, 2017 Disclosure.
Sample for proof of concept web site: http://burgman-club.ru/forum /away.php?s=https://www.exploit-db.com/
Do not be a bad.