Aerosol Posted January 20, 2015 Report Posted January 20, 2015 # Exploit Title: Privilege Escalation in RedaxScript 2.1.0# Date: 11-05-2014# Exploit Author: shyamkumar somana# Vendor Homepage: http://redaxscript.com/# Version: 2.1.0# Tested on: Windows 8#Privilege Escalation in RedaxScript 2.1.0 RedaxScript 2.1.0 suffers from a privilege Escalation vulnerability. Theissue occurs because the application fails to properly implement accesscontrols. The application also fails to perform proper sanity checks on theuser supplied input before processing it. These two flaws led to avertical privilege escalation. This can be achieved by a simply tamperingthe parameter values. An attacker can exploit this issue to gain elevatedprivileges to the application.*Steps to reproduce the instance:*· login as a non admin user· Go to account and update the account.· intercept the request and add “*groups[]=1*” to the post data andsubmit the request· Log out of the application and log in again. You can now browsethe application with admin privileges.This vulnerability was addressed in the following commit.https://github.com/redaxmedia/redaxscript/commit/bfe146f98aedb9d169ae092b49991ed1b3bc0860?diff=unified*Timeline*:09-26-2014: Issue identified09-27-2014: Discussion with the vendor10-27-2014: Issue confirmed11-05-2014: Patch released.Author: Shyamkumar SomanaVendor Homepage: http://redaxscript.com/downloadVersion: 2.1.0Tested on: Windows 7-- [image: --]shyam kumar[image: http://]about.me/shyamkumar.somana <http://about.me/shyamkumar.somana?promo=email_sig>Shyamkumar Somana | +91 89513 38625 | twitter.com/0xshyam |in.linkedin.com/in/sshyamkumar/ |Source Quote