vendor:
Microweber CMS
by:
Manojkumar J
8.8
CVSS
HIGH
Account Takeover
287
CWE
Product Name: Microweber CMS
Affected Version From: <=1.2.15
Affected Version To: <=1.2.15
Patch Exists: NO
Related CWE: CVE-2022-1631
CPE: a:microweber:microweber:1.2.15
Platforms Tested: Windows10
2022
Microweber CMS 1.2.15 – Account Takeover
Microweber Drag and Drop Website Builder E-commerce CMS v1.2.15 Oauth Misconfiguration Leads To Account Takeover. Steps to exploit: 1. Create an account with the victim's email address. Register endpoint: https://target-website.com/register# 2. When the victim tries to login with default Oauth providers like Google, Github, Microsoft, Twitter, Linkedin, Telegram or Facebook etc(auth login) with that same e-mail id that we created account before, via this way we can take over the victim's account with the recently created login credentials.
Mitigation:
The vulnerability can be mitigated by disabling the Oauth login feature and using only the default login feature.