vendor:
Evilsentinel
by:
BlackHawk
7.5
CVSS
HIGH
Admin Bypass, Captcha Bypass, Spamming/Anon Mailing
287
CWE
Product Name: Evilsentinel
Affected Version From: 1.0.9
Affected Version To: 1.0.9
Patch Exists: NO
Related CWE: N/A
CPE: a:evilsentinel:evilsentinel
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Evilsentinel <= 1.0.9 Disable Exploit
Evilsentinel is vulnerable to an admin bypass, captcha bypass, and spamming/anon mailing. The admin bypass is due to the lack of authentication check in the admin/index.php file. The captcha bypass is due to the lack of a call to the captcha.php file and the lack of a post variable named 'es_security_captcha'. The spamming/anon mailing is due to the ability to set a new mail for the admin in the ACP and attack the site with special forged HTTP_USER_AGENT headers to send a mail with the text you want.
Mitigation:
Ensure that authentication checks are in place for all admin pages and that captcha is enabled and properly configured.