关联漏洞
标题:
Tiki 安全漏洞
(CVE-2020-15906)
描述:Tiki是Tiki社区的一套开源的内容管理和门户应用程序,它可用于创建Web应用程序、门户网站、企业内部网、外联网等。 Tiki 21.2之前版本存在安全漏洞,该漏洞源于在50次无效的登录尝试之后,Tiki -login.php将管理密码设置为空值。
描述
Writeup of CVE-2020-15906
介绍
# CVE-2020-15906
Writeup of CVE-2020-15906.
Special Thanks to Frederic Mohr(Lastbreach) for your Backend Support.
## Tiki Wiki Cms Groupware 16.x - 21.1 Authentication Bypass by Maximilian Barz
I have found a new vulnerability in TikiWiki Cms Groupware 16.x - 21.1. It allows remote
unauthenticated attackers to bypass the login page which results in a full compromise of Tiki Wiki
CMS. An Attacker is able to bruteforce the Admin account until it is locked. After that an empty
Password can be used to authenticate as admin to get access.
## Affected file: tiki-login.php
## CVSS 3.1 Base Score: 9.3

# Walkthrough/ PoC:
### Normal condition
Take a look at the database. This is what the admin looks like after Tiki was installed. (Note that
provpass is empty)

### Step 1
Admin Login Brute Force results in about 15 "Invalid user or password" errors, then the message
should say "The mail cannot be sent" – maybe a verification problem because of to many requests

### Step 2
Keep Brute Forcing, just to be sure. If the Mail cant be send a different error message appears.
Just before the 50th request, the messages change again, now the account is locked.

### Step 3
If we now take a look inside the DB, we can see provpass got set.

### Step 4
Now try another login attempt, but remove the password from the request.

# Result: Admin Access is granted.

A full walkthrough video can be viewed on youtube (Videos are not publicly available.):
https://www.youtube.com/watch?v=v2YEpMsxcbA
PoC Exploit video on youtube:
https://youtu.be/o3blz2US54Y
### Exploit-DB:
https://www.exploit-db.com/exploits/48927
### Article on Portswigger.net
https://portswigger.net/daily-swig/amp/tikiwiki-authentication-bypass-flaw-gives-attackers-full-control-of-websites-intranets
### Credits:
Maximilian Barz (OSCP),
Email: mbzra@protonmail.com,
Twitter: S1lky_1337
文件快照
[4.0K] /data/pocs/5bde723ccd023342fb625235f6b7a916c2fd5dd0
├── [ 34K] Admin Access.png
├── [ 98K] Burpsuite.png
├── [ 11K] CVSS 3.1.png
├── [2.4K] README.md
├── [8.7K] Step1.png
├── [ 14K] Step2.png
├── [10.0K] Step3.png
├── [8.5K] Step4.png
├── [6.1K] TikiWiki_21.1_Authentication_Bypass.py
└── [174K] Tiki-Wiki Authentication Bypass.pdf
0 directories, 10 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。