Security
Headlines
HeadlinesLatestCVEs

Headline

PlayTube 3.0.1 Information Disclosure

PlayTube version 3.0.1 suffers from an information leakage vulnerability.

Packet Storm
#sql#vulnerability#web#windows#auth
# Exploit Title: PlayTube 3.0.1 - Redirect Information Disclosure# Exploit Author: CraCkEr# Date: 19/08/2023# Vendor: PlayTube# Vendor Homepage: https://playtubescript.com/# Software Link: https://demo.playtubescript.com/# Tested on: Windows 10 Pro# Impact: Sensitive Information Leakage# CVE: CVE-2023-4714# CWE: CWE-200 - CWE-284 - CWE-266## GreetingsThe_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushkaCryptoJob (Twitter) twitter.com/0x0CryptoJob## DescriptionInformation disclosure issue in the redirect responses, When accessing any page on the website,Sensitive data, such as app IDs, is being exposed in the body of these redirects.## Steps to Reproduce:When you visit most of pages on the website, such as the index page for example:https://website/in the body page response there's information leakage for "RazorPay Payment" id KEY+--------------------------------------+razorpay_options = {          key: "rzp_test_ruz***********"+--------------------------------------+Note: The same information leaked, for the app ID KEY, was added to the "Payment Configuration" in the Administration PanelSettings of "Payment Configuration" in the Administration Panel, on this Path:https://website/admin-cp/payment-settings[-] Done

Related news

CVE-2023-4714

A vulnerability was found in PlayTube 3.0.1 and classified as problematic. This issue affects some unknown processing of the component Redirect Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. The identifier VDB-238577 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Packet Storm: Latest News

WordPress Really Simple Security Authentication Bypass