CVE-2013-1402 - DigiLIBE Management Console - Execution After Redirect (EAR) Vulnerability

2013-01-28T00:00:00
ID SECURITYVULNS:DOC:28987
Type securityvulns
Reporter Securityvulns
Modified 2013-01-28T00:00:00

Description

Product: DigiLIBE Management Console Vendor: Digitiliti Version: < 3.4 - ? Tested Version: 3.4 Vendor Notified Date: October 09, 2012 Release Date: January 18, 2013 Risk: High Authentication: None required Remote: Yes

Description: Execution After Redirect vulnerabilities exist in DigiLIBE Management Console versions 3.4 and possibly other versions. This allows remote attackers to retrieve sensitive data that should only be returned to authenticated users. By not properly terminating the code after redirection an unauthenticated attacker can choose to not follow the redirect and view the normally protected content. Successful exploitation of this vulnerability resulted obtaining the contents of the 'General Configuration'.

Exploit steps for proof-of-concept: 1. Using a proxy such as Burp Proxy intercept request: https://vulnerablehost.com/configuration/general_configuration.html 2. Send to repeater. 3. View response.

Vendor Notified: Yes Vendor Response: November 11, 2012 - Deployed security update. Version not confirmed.

Reference: CVE-2013-1402 http://cs.ucsb.edu/~bboe/public/pubs/fear-the-ear-ccs2011.pdf https://www.owasp.org/index.php/Execution_After_Redirect_(EAR)

Credit: Robert Gilbert HALOCK Security Labs