blog:witchschool_full_access
Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| blog:witchschool_full_access [2025/04/02 02:51] – created hacktheplanet | blog:witchschool_full_access [2025/12/02 07:23] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ====== WitchSchool Full Access ====== | ||
| + | |||
| + | ==== ==== | ||
| + | WitchSchool.com is an online school that provides education in Wicca, Paganism, and other metaphysical subjects. It offers courses on various aspects of Wiccan spirituality, | ||
| + | |||
| + | |||
| + | < | ||
| + | Security Vulnerability Report | ||
| + | Vulnerability Title: WitchSchool Full Access | ||
| + | Date Discovered: Fall 2021 | ||
| + | Tester: Rev. Jedite | ||
| + | |||
| + | Website Affected: http:// | ||
| + | 1. Vulnerability Details | ||
| + | Type of Vulnerability: | ||
| + | Severity: Unknown | ||
| + | Potential Impact: Unauthorized access to lesson pages that users are not registered for or have not paid to | ||
| + | access. | ||
| + | Affected Components: All lesson pages with the URL starting with https:// | ||
| + | |||
| + | 2. Steps to Reproduce | ||
| + | Log in to http:// | ||
| + | Navigate to https:// | ||
| + | Where ### is any number. | ||
| + | Observe the page loading without restrictions. | ||
| + | |||
| + | Example URLs: | ||
| + | 2nd Degree: | ||
| + | 3rd Degree: | ||
| + | CWC103 Correllian Philosophy | ||
| + | CWC104 Correllian Ministry: | ||
| + | |||
| + | 3. Proof of Concept (PoC) | ||
| + | Description: | ||
| + | from the site. The plugin sequentially accesses lesson URLs by manipulating the URL parameter, enabling users | ||
| + | to access unauthorized lessons that they are not registered for. | ||
| + | | ||
| + | Functionality: | ||
| + | lesson pages (e.g., https:// | ||
| + | etc.), allowing unauthorized access to lessons without proper access controls. | ||
| + | Technical Details: The plugin automates the process, requiring only that the user is logged in to the website | ||
| + | with a valid account. | ||
| + | Download: https:// | ||
| + | |||
| + | 3.1 Installing Proof of Concept: | ||
| + | Download from URL above. | ||
| + | Unzip the files. | ||
| + | Open Firefox. | ||
| + | Type about: | ||
| + | Click "This Firefox" | ||
| + | Click "Load Temporary Add-on" | ||
| + | Run extension. | ||
| + | Files will be out put to Downloads folder. | ||
| + | |||
| + | 4. Responsible Disclosure Plan | ||
| + | Contact Email: Please contact me at [email protected] to discuss this issue further. | ||
| + | Public Disclosure: I plan to disclose the details of this vulnerability publicly after 30-days. | ||
| + | </ | ||
