---------------------------------------------------------------------------
[ECHO_ADV_21$2005] MUltiple Vulnarable In ActiveBuyAndSell
---------------------------------------------------------------------------
Author: Dedi Dwianto
Date: June, 24th 2005
Location: Indonesia, Jakarta
Web: http://echo.or.id/adv/adv21-theday-2005.txt
---------------------------------------------------------------------------
Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Application : ActiveBuyAndSell
version : 6.2
URL : http://ActiveWebSoftwares.com
Author : ActiveWebSoftwares
Description :
ActiveBuyAndSell is a Web-based application that connects people selling products
and services with people looking to buy products and services. Uses MS SQL or
Access database. Full ASp source code included.
---------------------------------------------------------------------------
Vulnerabilities:
~~~~~~~~~~~~~~~~
A. SQL Injection:
* http://victim/ebuyandsell/default.asp?catid=[SQL inject]
* http://victim/ebuyandsell/buyersend.asp?catid=[SQL inject]
* http://victim/ebuyandsell/admin.asp
In this pages vulnarable sql injection in form input
POC :
Administrator ID :[SQL Inject]
Password :blank
* http://victim/ebuyandsell/advertiserstart.asp
POC :
E-mail Address :[SQL inject]
Password :blank
* http://victim/ebuyandsell/buyer.asp
POC :
E-mail :[SQL inject]
Password :blank
* http://victim/ebuyandsell/search.asp
POC :
Keyword :[SQL inject]
B. Xss
* http://victim/ebuyandsell/sendpassword.asp?Table=Buyer&Title=[XSS]&EmailFld=BEmail
POC :
http://victim/ebuyandsell/sendpassword.asp?Table=Buyer&Title=&EmailFld=BEmail
* http://victim/ebuyandsell/search.asp
POC :
Keyword :
C. Fix
Vendor allready contacted but still no response and i can't fix it because
i can't view source code :lol
---------------------------------------------------------------------------
Shoutz:
~~~~~~~
~ y3dips, moby, comex, z3r0byt3, K-159, c-a-s-e, S`to, lirva32, anonymous
~ Lieur Euy , MSR
~ newbie_hacker@yahoogroups.com ,
~ #e-c-h-o@DALNET
---------------------------------------------------------------------------
Contact:
~~~~~~~~
the_day || echo|staff || the_day[at]echo[dot]or[dot]id
Homepage: http://theday.echo.or.id/
-------------------------------- [ EOF ] ----------------------------------