Lucene search

K
packetstormSamrat DasPACKETSTORM:146251
HistoryFeb 05, 2018 - 12:00 a.m.

Wonder CMS 2.3.1 Host Header Injection

2018-02-0500:00:00
Samrat Das
packetstormsecurity.com
31

0.021 Low

EPSS

Percentile

89.2%

`# Exploit Title: Wonder CMS 2.3.1 Host Header Injection  
# Date: 30-01-2018  
# Exploit Author: Samrat Das  
# Contact: http://twitter.com/Samrat_Das93  
# Website: https://securitywarrior9.blogspot.in/  
# Vendor Homepage: https://www.wondercms.com/  
# Version: 2.3.1  
# CVE : CVE-2017-14523  
# Category: Webapp CMS  
  
1. Description  
  
The application allows illegitimate host header manipulation and leads to aribtary web page re-direction. This can also lead to severe attacks such as password reset or web cache poisoning  
  
  
  
2. Proof of Concept  
  
Intercept any web request of cms using a proxy tool.   
Change the http host header to:   
POST / HTTP/1.1  
Host: google.com  
  
You can observe the page being re-directed and the Location header changed in response to: http://www.google.com/   
  
3. Solution:  
  
To Mitigate host header injections allows only a whitelist of allowed hostnames.  
  
  
`

0.021 Low

EPSS

Percentile

89.2%