Authored by Rajdip Dey Sarkar

OpenCart CMS version 4.0.2.2 suffers from a login brute forcing vulnerability.

advisories | CVE-2023-40834

# Exploit Title: OpenCart CMS v4.0.2.2 Login Vulnerability
# Date: 5-9-2023
# Category: Web Application [CMS]
# Exploit Author: Rajdip Dey Sarkar
# Version: 4.0.2.2
# Tested on: Windows/Kali
# CVE: CVE-2023-40834



Description:
----------------
OpenCart CMS version 4.0.2.2 is susceptible to login brute-force attacks,
where attackers can repeatedly try to guess login credentials without any
protective mechanisms in place.


Vulnerable Parameter:
-----------------------
`Password`


Steps to reproduce:
---------------------
> Initial Login Attempt: An attacker visits the login page `
http://localhost/opencart-4.0.2.2/index.php?route=account/login&language=en-gb`
<http://localhost/opencart-4.0.2.2/index.php?route=account/login&language=en-gb>
and
enters a valid username along with an incorrect password to trigger an
authentication attempt.

> Request Capture: The attacker intercepts the HTTP request sent to the
server during the failed login attempt using tools like proxy servers. This
captured request contains the authentication details.

> Request Modification: The attacker uses a tool like "Intruder" to
automate the process of submitting multiple password variations. They
modify the captured request to include different passwords, including the
correct one, to be used in the brute force attack.

> Brute Force Attack: The attacker launches the brute force attack by
sending the modified requests with different password combinations to the
server. They analyze the responses to identify differences in response
lengths or messages that reveal the correct password, account lockout
information, or other vulnerabilities.