Praetorian503 Posted January 23, 2013 Report Posted January 23, 2013 Digitiliti DigiLIBE Management Console version 3.4 suffers from an execution after redirect vulnerability that discloses sensitive information.Product: DigiLIBE Management ConsoleVendor: DigitilitiVersion: < 3.4 - ?Tested Version: 3.4Vendor Notified Date: October 09, 2012Release Date: January 18, 2013Risk: HighAuthentication: None requiredRemote: YesDescription:Execution After Redirect vulnerabilities exist in DigiLIBE Management Console versions 3.4 and possibly other versions. This allows remote attackers to retrieve sensitive data that should only be returned to authenticated users.By not properly terminating the code after redirection an unauthenticated attacker can choose to not follow the redirect and view the normally protected content.Successful exploitation of this vulnerability resulted obtaining the contents of the 'General Configuration'.Exploit steps for proof-of-concept:1. Using a proxy such as Burp Proxy intercept request: https://vulnerablehost.com/configuration/general_configuration.html2. Send to repeater.3. View response.Vendor Notified: YesVendor Response: November 11, 2012 - Deployed security update. Version not confirmed.Reference:CVE-2013-1402http://cs.ucsb.edu/~bboe/public/pubs/fear-the-ear-ccs2011.pdfhttps://www.owasp.org/index.php/Execution_After_Redirect_(EAR)Credit:Robert GilbertHALOCK Security LabsSource: PacketStorm Quote