Jump to content
Praetorian503

DigiLIBE Management Console 3.4 Execution After Redirect

Recommended Posts

Posted

Digitiliti DigiLIBE Management Console version 3.4 suffers from an execution after redirect vulnerability that discloses sensitive information.

Product: DigiLIBE Management Console
Vendor: Digitiliti
Version: < 3.4 - ?
Tested Version: 3.4
Vendor Notified Date: October 09, 2012
Release Date: January 18, 2013
Risk: High
Authentication: None required
Remote: Yes

Description:
Execution After Redirect vulnerabilities exist in DigiLIBE Management
Console versions 3.4 and possibly other versions. This allows remote
attackers to retrieve sensitive data that should only be returned to
authenticated users.
By not properly terminating the code after redirection an
unauthenticated attacker can choose to not follow the redirect and view
the normally protected content.
Successful exploitation of this vulnerability resulted obtaining the
contents of the 'General Configuration'.

Exploit steps for proof-of-concept:
1. Using a proxy such as Burp Proxy intercept request:
https://vulnerablehost.com/configuration/general_configuration.html
2. Send to repeater.
3. View response.

Vendor Notified: Yes
Vendor Response: November 11, 2012 - Deployed security update. Version
not confirmed.

Reference:
CVE-2013-1402
http://cs.ucsb.edu/~bboe/public/pubs/fear-the-ear-ccs2011.pdf
https://www.owasp.org/index.php/Execution_After_Redirect_(EAR)

Credit:
Robert Gilbert
HALOCK Security Labs

Source: PacketStorm

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...