[] NeoSense

Wonder CMS 2.3.1 - 'Host' Header Injection

Author: Samrat Das
type: webapps
platform: php
port: 
date_added: 2018-02-05 
date_updated: 2018-02-05 
verified: 0 
codes: CVE-2017-14523 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.comWonderCMS-2.3.1.zip

# Exploit Title: Wonder CMS 2.3.1 Host Header Injection
# Date: 30-01-2018
# Exploit Author: Samrat Das
# Contact: http://twitter.com/Samrat_Das93
# Website: https://securitywarrior9.blogspot.in/
# Vendor Homepage: https://www.wondercms.com/
# Version: 2.3.1
# CVE : CVE-2017-14523
# Category: Webapp CMS

1. Description

The application allows illegitimate host header manipulation and leads to aribtary web page re-direction. This can also lead to severe attacks such as password reset or web cache poisoning



2. Proof of Concept

Intercept any web request of cms using a proxy tool.
Change the http host header to:
POST / HTTP/1.1
Host: google.com

You can observe the page being re-directed and the Location header changed in response to: http://www.google.com/

3. Solution:

To Mitigate host header injections allows only a whitelist of allowed hostnames.