Improper Resolution of Path Equivalence in microweber-dev/whmcs_plugin
Reported on
Feb 28th 2022
DESCRIPTION
Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL within the application that causes a redirection to an arbitrary external domain. This behavior can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targeting the correct domain and with a valid SSL certificate (if SSL is used), lends credibility to the phishing attack because many users, even if they verify these features, will not notice the subsequent redirection to a different domain.
STEPS TO REPRODUCE:
There is an open redirection vulnerability in the path of = https://microweber.com/get-started?ref=susp#frameurl=
here is " frameurl= " are vulnerable for open redirect
you bypass this vulnerbility using BASE64 encoded mathod
"https://bing.com" encode this url in base64 so its looks like = aHR0cHM6Ly9iaW5nLmNvbQ==
SO YOU CAN VISIT URL = https://microweber.com/get-started?ref=susp#frameurl=aHR0cHM6Ly9iaW5nLmNvbQ==
YOU CAN SEE THAT URL REDIRECT TO BING.COM
Impact
An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance.
Occurrences
SECURITY.md
2 years ago
We can go ahead and publish a CVE if the maintainer is happy to do so. With regards to the bounty, this repository is not deemed popular enough by our pricing model to warrant bounty rewards.
@maintainer - can you please confirm that you are happy for us to assign and publish a CVE?
Hello Thanks for assigned CVE
I want to know when are the Description and References going to be updated on https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0855 ?
Once this PR has been merged, the details will be made available on MITRE/NVD.
Hi, this CVE is not part of Microweber CMS and PR cannot be done.
The error is on the template side and not part of the CMS
Hi, this is the commit https://github.com/microweber-dev/whmcs_plugin/commit/06bf36d43f1334f059677d404b2a94edf94a1095#diff-1cb1f5725f531f6da8a8696c5755be5c43f547d797b7141804bb00cc292f3d1b
if you move this report to the repository of https://github.com/microweber-dev/whmcs_plugin/ i will be able to mark it