what you don't know can hurt you

Wampserver 3.1.8 Cross Site Request Forgery

Wampserver 3.1.8 Cross Site Request Forgery
Posted Jun 10, 2019
Authored by Imre Rad

Wampserver versions 3.1.4 through 3.1.8 suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 371fb1ffa0f488be53a31b94a2d1e9e1

Wampserver 3.1.8 Cross Site Request Forgery

Change Mirror Download
Affected product:
WampServer 3.1.4-3.1.8

Offiical description:
"WampServer is a Windows web development environment. It allows you to
create web applications with Apache2, PHP and a MySQL database.
Alongside, PhpMyAdmin allows you to manage easily your databases."

Official website:
http://www.wampserver.com/en/

Vulnerability description:
The add_vhost.php script in the administration panel of Wampserver was
vulnerable to Cross Site Request Forgery (CVE-2018-8817 -
https://www.exploit-db.com/exploits/44385) in WampServer 3.1.2 and
below.
The synchronizer pattern added as remediation was not implemented
properly, so that WampServer 3.1.3 - 3.1.8 were still vulnerable to
CSRF; attackers could abuse this flaw to get new vhosts added or
existing ones deleted in the Apache configuration file.
Technical requirement of successful exploitation is that the admin has
not opened the add_vhost.php file in the current browser serssion yet
(so the random tokens are not initialized).

Proof of concept form to expose drive c:\:

<form name="csrfWamp" method="post"
action="http://localhost/add_vhost.php?lang=english">
<input type="text" name="vh_name" value="whatever.com">
<textarea type="text" name="vh_folder">c:///</textarea>
<input type="hidden" name="checkadd" value="">
<input type="submit" name="submit" value="Start!">
</form>

Fixed WampServer version:
3.1.9

Official changelog:
http://forum.wampserver.com/read.php?2,138295,155552#msg-155552

Login or Register to add favorites

File Archive:

June 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    10 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close