Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-13405 PoC — Microweber 信息泄露漏洞

Source
Associated Vulnerability
Title:Microweber 信息泄露漏洞 (CVE-2020-13405)
Description:Microweber是美国Microweber社区的一套可提供拖拽功能的网上商店管理系统。该系统包括添加商品、图片等模块。 Microweber 1.1.20之前版本中的userfiles/modules/users/controller/controller.php文件存在安全漏洞。攻击者可借助/modules/ POST请求利用该漏洞获取用户数据库。
Description
MicroWeber Unauthenticated User Database Disclosure - CVE-2020-13405
Readme
# CVE-2020-13405

- Base Score:  7.5 HIGH🟥

MicroWeber is an open-source Content Management System (CMS) written in PHP. It allows web administrators to easily build a website by dragging and dropping components where they want them to be. It is a popular choice among those looking to start a website that is both easy to set up and is very customizable.

`userfiles/modules/users/controller/controller.php` in Microweber before `1.1.20` allows an unauthenticated user to disclose the users database via a `/modules/` `POST` request. 

When an attacker sends a POST request to this endpoint, it leads to the unauthorized disclosure of sensitive user information, including usernames, passwords, and email addresses, from the users' database. 

![image](https://github.com/mrnazu/CVE-2020-13405/assets/108541991/6cff8df6-6289-442e-8be1-f7edd62b0f23)

As a PHP-centric Content Management System, MicroWeber engages a variety of PHP scripts to manage its diverse functionalities. This inherent design enables MicroWeber to be highly adaptable, empowering users to seamlessly integrate their own scripts or effortlessly tweak existing ones, thereby offering a means to tailor the operation of the CMS according to individual preferences.

The vulnerability was discovered in the “controller.php” script, which is part of MicroWeber’s users module.
```php
<?php
dd(User::all());
```
This code snippet reveals the presence of a serious security vulnerability in the `"controller.php"` script of MicroWeber's users module. The code `dd(User::all());` suggests that it's attempting to dump and display all user records from the database using the `User::all()` method.


## PoC
Now, once you have saved the PoC from here, then.. you need to open up your terminal and start a python server: `python -m SimpleHTTPServer 4444`
Now, Go to your browser and load it.

Enjoy! Use censys search engine to find a target with a version before `1.1.20`
File Snapshot

[4.0K] /data/pocs/b3c8983de11a58fb27eff1e8dbdc461bb4cff90a ├── [ 34K] LICENSE ├── [1.9K] PoC.html └── [1.9K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.