CSRF, Authentication Bypass & RCE in GuppY
Advisory ID: | HTB23299 |
Product: | GuppY |
Vendor: | GuppY |
Vulnerable Versions: | 5.01 and probably prior |
Tested Version: | 5.01 |
Advisory Publication: | March 2, 2016 [without technical details] |
Vendor Notification: | March 2, 2016 |
Public Disclosure: | September 26, 2018 |
Vulnerability Type: | Cross-Site Request Forgery [CWE-352] Improper Authentication [CWE-287] |
CVE Reference: | Pending |
Risk Level: | High |
CVSSv2 Base Scores: | 4.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L] 8.3 [CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H] |
Discovered and Provided: | High-Tech Bridge Security Research Lab |
Advisory Details: | |
High-Tech Bridge Security Research Lab discovered two vulnerabilities in open web portal software GuppY. A remote attacker can delete arbitrary files, bypass authentication and execute arbitrary file on vulnerable system. | |
Solution: | |
Vendor notified, awaiting vendor solution. | |
References: | |
[1] High-Tech Bridge Advisory HTB23299 - https://www.immuniweb.com/advisory/HTB23299 - CSRF, Authentication Bypass & RCE in GuppY [2] GuppY - http://www.freeguppy.org - GuppY: the easy and free web portal that requires no database to run [3] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. [4] ImmuniWeb® - Leveraging the power of machine-learning and genius of human brain to deliver the most advanced web application security and penetration testing. [5] ImmuniWeb® SSLScan - Test your servers for security and compliance with PCI DSS, HIPAA and NIST. | |
HTB23289: SSO Authentication Bypass and Website Takeover in DOKEOS
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.