DigiLIBE Management Console 3.4 Execution After Redirect

2013-01-22T00:00:00
ID PACKETSTORM:119740
Type packetstorm
Reporter Robert Gilbert
Modified 2013-01-22T00:00:00

Description

                                        
                                            `Product: DigiLIBE Management Console  
Vendor: Digitiliti  
Version: < 3.4 - ?  
Tested Version: 3.4  
Vendor Notified Date: October 09, 2012  
Release Date: January 18, 2013  
Risk: High  
Authentication: None required  
Remote: Yes  
  
Description:  
Execution After Redirect vulnerabilities exist in DigiLIBE Management   
Console versions 3.4 and possibly other versions. This allows remote   
attackers to retrieve sensitive data that should only be returned to   
authenticated users.  
By not properly terminating the code after redirection an   
unauthenticated attacker can choose to not follow the redirect and view   
the normally protected content.  
Successful exploitation of this vulnerability resulted obtaining the   
contents of the 'General Configuration'.  
  
Exploit steps for proof-of-concept:  
1. Using a proxy such as Burp Proxy intercept request:   
https://vulnerablehost.com/configuration/general_configuration.html  
2. Send to repeater.  
3. View response.  
  
Vendor Notified: Yes  
Vendor Response: November 11, 2012 - Deployed security update. Version   
not confirmed.  
  
Reference:  
CVE-2013-1402  
http://cs.ucsb.edu/~bboe/public/pubs/fear-the-ear-ccs2011.pdf  
https://www.owasp.org/index.php/Execution_After_Redirect_(EAR)  
  
Credit:  
Robert Gilbert  
HALOCK Security Labs  
`