Vulnerability Open Redirect LogicBoard CMS

Hello everybody,

Today I could my first post in english. These are a vulnerability open redirect at CMS of Russian origin. From Russia with Love ;) 

Description:
URL: mysite.com/forum/away.php?s=
Affected Component: /forum/away.php?s=

Vulnerability Type: 
Vulnerability Open Redirect  https://cwe.mitre.org/data/definitions/601.html 

Vendor of Product: 
LogicBoard CMS 

Version: 
3.0, 4.0, 4.1

Attack Type: 
Remote

Impact: 
A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance.
 Attack Vectors: s=   Infection from malware and phishing attack.

About:
LogicBoard CMS: It's a CMS oriented forums engines, ideal for corporate sites, online shops, communities and so on.
 
Credits:
These vulnerabilities have been discovered by
Francisco Javier Santiago Vázquez  aka "n0ipr0cs"
https://es.linkedin.com/in/francisco-javier-santiago-v%C3%A1zquez-1b654050 
https://twitter.com/n0ipr0cs

Disclosure Timeline:
Agust 28, 2016: Vulnerability acquired by Francisco Javier Santiago
Vázquez. aka "n0ipr0cs".
29 Agust, 2016 Responsible disclosure to Babylon Security Team.
30 Agust, 2016 Responsible disclosure to Babylon Security Team.
31 Agust, 2016 Responsible disclosure to Babylon Security Team.
03 January, 2017 Forward mail, please let me know when the vulnerability be solved in order to publish it.
31 January, 2017 Disclosure.

Sample for proof of concept web site: http://burgman-club.ru/forum  /away.php?s=https://www.exploit-db.com/

video



Do not be a bad.

Share this

Related Posts

Previous
Next Post »