vendor:
Webspell
by:
h0yt3r
8.8
CVSS
HIGH
Login Bypass
20
CWE
Product Name: Webspell
Affected Version From: Webspell 4.2.2a
Affected Version To: Webspell 4.2.2a
Patch Exists: No
Related CWE: None
CPE: a:webspell:webspell
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
Found in 2020
Webspell Login Bypass
Webspell is vulnerable to login bypass due to the lack of proper input validation. The vulnerability is present in the checklogin.php file, line 60, where the userID and the ws_pwd are set as a cookie without any validation. The vulnerability can be exploited by setting the $_COOKIE['ws_auth'] to something like 'or/**/1=1/**/limit/**/0,1#' and exploiting the $_SESSION['ws_auth'] = $_COOKIE['ws_auth']. The vulnerability is only exploitable when magic_quotes is set to off.
Mitigation:
The vulnerability can be mitigated by properly validating the userID and ws_pwd before setting them as a cookie.