vendor:
Wonder CMS
by:
Samrat Das
7.5
CVSS
HIGH
Host Header Injection
601
CWE
Product Name: Wonder CMS
Affected Version From: 2.3.1
Affected Version To: 2.3.1
Patch Exists: NO
Related CWE: CVE-2017-14523
CPE: 2.3.1
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2018
Wonder CMS 2.3.1 Host Header Injection
The application allows illegitimate host header manipulation and leads to aribtary web page re-direction. This can also lead to severe attacks such as password reset or web cache poisoning. To exploit, intercept any web request of cms using a proxy tool and change the http host header to: POST / HTTP/1.1 Host: google.com. You can observe the page being re-directed and the Location header changed in response to: http://www.google.com/
Mitigation:
Allow only a whitelist of allowed hostnames.