[webapps] ProConf 6.0 - Insecure Direct Object Reference (IDOR)
ProConf 6.0 存在不安全直接对象引用漏洞,允许作者通过修改 Paper ID 查看并获取其他用户的论文及个人信息(姓名、邮箱等),该漏洞在 6.1 版本中修复。 2025-4-16 00:0:0 Author: www.exploit-db.com(查看原文) 阅读量:3 收藏

# Exploit Title: ProConf 6.0 -  Insecure Direct Object Reference (IDOR)
# Date: 19/07/2018
# Exploit Author: S. M. Zia Ur Rashid, SC
# Author Contact: https://www.linkedin.com/in/ziaurrashid/
# Vendor Homepage: http://proconf.org & http://myproconf.org
# Version:  <= 6.0
# Tested on: Windows
# CVE : CVE-2018-16606
# Patched Version: 6.1

# Description:
In ProConf before 6.1, an Insecure Direct Object Reference (IDOR) allows
any author to view and grab all submitted papers (Title and Abstract) and
their authors' personal information (Name, Email, Organization, and
Position) by changing the value of Paper ID (the pid parameter).

# PROOF-OF-CONCEPT
Step 1: Sign In as an author for a conference & submit a paper. Youall get
a paper ID.
Step 2: Now go to paper details and change the value of Paper ID (param
pid=xxxx) to nearest previous value to view others submitted paper &
authors information.
http:// <http:>
[host]/conferences/[conference-name]/author/show_paper_details.php?pid=xxxx
            

文章来源: https://www.exploit-db.com/exploits/52236
如有侵权请联系:admin#unsafe.sh