CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in microweber/microweber
Feb 17th 2022
The Introduction of a New Line Character lets the attacker the stack trace at demo.microweber.org/ This Attack becomes more significant because of its Less complication.
The Stack trace discloses following information :
- Backend Response code.
- The Versions of Backend Laravel technology.
- The Routing Path
Proof of Concept
- Visit the following URL :
- Now Add the CRLF payload to the parameter. It will look like this :
This vulnerability is capable of disclosing sensitive stack trace exposed by the back-end which will let the attacker escalate his/her attack vector.
I Hope you understand this issue and Fix it as soon as possible. Thank you.
I Don't have a complete Idea where this issue is actually occurring in the code link provided. But i'm guessing it should be a potential path for that vulnerability to occur.
Hello, I Found another Path which Discloses more information regarding Stack Trace :
As you can see the name "users" in the
load_module: is changed to "admin" which discloses more information about the particular user.
the other issue is also fixed in this commit https://github.com/microweber/microweber/commit/a1667f11dca579105818bc5ee3f85230dfd45c5e