<pre><code>====================================================================================================================================<br />| # Title : Chevereto CMS V3.7.0 HPP Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0.2(64-bit) |<br />| # Vendor : https://chevereto.com/ |<br />| # Dork : |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine .<br /><br />[+] Vulnerability description: <br /><br /> This script is possibly vulnerable to HTTP Parameter Pollution attacks. <br /> HPP attacks consist of injecting encoded query string delimiters into other existing parameters. <br /> If the web application does not properly sanitize the user input, a malicious user can compromise <br /> the logic of the application to perform either clientside or server-side attacks. <br /> <br />[+] This vulnerability affects : /chevereto/search/images. <br /><br />[+] Attack details:<br /> <br /> URL encoded GET input q was set to H!%26im%3dindoushka <br /> Parameter precedence: last occurrence Affected link: http://127.0.0.1/democheveretocom/search/images/?q=H!%26im%3dindoushka <br /> <br />[+] Affected parameter: q=1 http://127.0.0.1/democheveretocom/search/images/?q=H!%26im%3dindoushka<br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /></code></pre>