Online Examination System v1.0 - Multiple Open Redirects
Summary
Name | Online Examination System v1.0 - Multiple Open Redirects |
Code name | Uchida |
Product | Online Examination System |
Vendor | Projectworlds Pvt. Limited |
Affected versions | Version 1.0 |
State | Public |
Release date | 2023-11-01 |
Vulnerabilities
Kind | Open Redirect |
Rule | 156. Uncontrolled external site redirect |
Remote | Yes |
CVSSv3 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
CVSSv3 Base Score | 6.1 |
Exploit available | Yes |
CVE ID(s) | CVE-2023-45201, CVE-2023-45202, CVE-2023-45203 |
Description
Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities.
Vulnerabilities
CVE-2023-45201
The 'q' parameter of the admin.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL:
$ref=@$_GET['q'];
...
if($count==1){
session_start();
if(isset($_SESSION['email'])){
session_unset();}
$_SESSION["name"] = 'Admin';
$_SESSION["key"] ='sunny7785068889';
$_SESSION["email"] = $email;
header("location:dash.php?q=0");
}
else header("location:$ref?w=Warning : Access denied");
CVE-2023-45202
The 'q' parameter of the feed.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL:
$ref=@$_GET['q'];
...
header("location:$ref?q=Thank you for your valuable feedback");
CVE-2023-45203
The 'q' parameter of the login.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL:
$ref=@$_GET['q'];
...
if($count==1){
while($row = mysqli_fetch_array($result)) {
$name = $row['name'];
}
$_SESSION["name"] = $name;
$_SESSION["email"] = $email;
header("location:account.php?q=1");
} else
header("location:$ref?w=Wrong Username or Password");
Our security policy
We have reserved the IDs CVE-2023-45201, CVE-2023-45202 and CVE-2023-45203 to refer to these issues from now on.
System Information
- Version: Online Examination System v1.0
- Operating System: Any
Mitigation
There is currently no patch available for this vulnerability.
Credits
The vulnerability was discovered by Andres Roldan from Fluid Attacks' Offensive Team.
References
Vendor page https://projectworlds.in/
Timeline
2023-10-05
Vulnerability discovered.
2023-10-05
Vendor contacted.
2023-11-01
Public Disclosure.