WoWonder Social Network Platform 0-day Authentication Bypass Vulnerability (CVE-2021-27200)

WoWonder Social Network Platform 0-day Authentication Bypass Vulnerability (CVE-2021-27200)

Wowonder is a web application software written using the PHP programming language that allows you to create your social networking platform. When the software is purchased through codecanyon, the source code will be included, and you will be able to run the software on your server. The application received an update and was released with a 3.1 version number after we notified the vulnerabilities that we found to the vendor.

As a result of our research on the Wowonder social network platform application, we detected an Authentication Bypass vulnerability caused by the "code" parameter in the password reset link.

Remote attackers can take over any account due to the weak cryptographic algorithm in recover.php file. The code parameter is easily predicted from the time of day.

If an attacker exploits this vulnerability, the attacker may access all accounts in the WoWonder application.

How Did We Detect Wowonder Social Network Platform Authentication Bypass Vulnerability?

As the Security For Everyone team, we regularly look for vulnerabilities in the software we have chosen to find 0-day. One of the software we chose was the Wowonder Social Network Platform web application, which serves as a social media platform. After deciding on the application that we are going to look for vulnerability, we performed the following steps in order:

  • We decided to manually examine the source codes of the application purchased on Codecanyon after seeing that examining it with automatic source code analysis tools produced too many false positives.

  • We determined that all requests are sent to the requests.php page by taking the function name as a parameter (requests.php?f=recover).

  • We have seen that the "code" parameter in the password reset link is easily predicted from the time of day. The password reset code can be estimated by combining the password reset link time and the random value generated between 111 and 999.

  • We discovered that the vulnerability could be triggered when we sent the estimated reset code to the password reset page.

  • Using the Authentication Bypass vulnerability we detected, we were able to access all accounts in the WoWonder application

Finally, we applied to Mitre and got our CVE code.

What To Do?

After detecting the vulnerability, we reported the vulnerability to the Wowonder software team. Then, they fixed the vulnerability and updated the new version on Codecanyon. Downloading the current version and using it on your systems is recommended by the Security For Everyone team.

Sources

Share: