what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ocPortal CMS 7.1.5 Open Redirect

ocPortal CMS 7.1.5 Open Redirect
Posted Jul 29, 2012
Authored by Aung Khant | Site yehg.net

ocPortal CMS versions 7.1.5 and below are vulnerable to open URL redirection.

tags | exploit
SHA-256 | 353cd4c439e094016caa438e0e165cbccde2fc29c1d867a80b2e7e755c9e4333

ocPortal CMS 7.1.5 Open Redirect

Change Mirror Download
1. OVERVIEW

ocPoral CMS 7.1.5 and lower versions are vulnerable to Open URL Redirection.


2. BACKGROUND

ocPortal is the website Content Management System (a CMS) for building
and maintaining a dynamic website. ocPortal's powerful feature-set
means there's always a way to accomplish your vision. Not only does
ocPortal's CMS have all the features you'd expect: for instance photo
galleries, news, file downloads and community forums/chats, but it
does so whilst meeting the highest accessibility and professional
standards. It is also smart enough to go beyond page management, to
automatically handle search engine optimisation, and provide
aggressive hack attack prevention.


3. VULNERABILITY DESCRIPTION

ocPoral CMS 7.1.5 and lower versions contain a flaw that allows a
remote cross site redirection attack. This flaw exists because the
application does not properly sanitise the "redirect" parameter. This
allows an attacker to create a specially crafted URL, that if clicked,
would redirect a victim from the intended legitimate web site to an
arbitrary web site of the attacker's choice.


4. VERSIONS AFFECTED

Tested on 7.1.5


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/ocportal/index.php?page=login&type=misc&redirect=http://attacker.in


6. SOLUTION

Upgrade to the latest version.


7. VENDOR

ocPortal Development Team
http://www.ocportal.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-03-06: notified vendor
2012-03-21: patched version,7.1.6, released
2012-07-29: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bocportal_7x%5D_open_url_redirection


#yehg [2012-07-29]
Login or Register to add favorites

File Archive:

October 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    0 Files
  • 2
    Oct 2nd
    22 Files
  • 3
    Oct 3rd
    19 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close