Exploit Author: Aurelien BOURDOIS
Vendor: GreaterWMS
Issue: Issue 383
- GreaterWMS <= 2.1.49
Credential disclosure vulnerabilty via the /staff
route in GreaterWMS <= 2.1.49 allows a remote unauthenticated attackers to bypass authentication and escalate privileges.
- Go to the main page
- Intercept flaws with a tool like BurpSuite
- Insert random username and password, then press
Login
button
It is possible to retrieves all the OPENID availables (warehouse id) with the
/warehouse/multiple
GET request, even unauthenticated. Users are grouped by warehouse.
-
On this interception, we can see that the OPENID value automatically inserted on the connection page appears in the
token
header. -
Put this request in the repeater, and then delete the
staff_name
andcheck_code
parameters/values. It is then possible to retrieve all the users of this Center Warehouse (Token / OPENID value). -
If we wish, we can then filter using the
staff_name
andstaff_type
parameters. -
The attacker must then choose the user to impersonate, taking the values staff_name and check_code and placing them in the intercepted request.
-
By sending this request, which had been intercepted during the authentication phase, the attacker is then authenticated as the chosen user.
An unauthenticated attacker can impersonate all users.