what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

maxwebportal.txt

maxwebportal.txt
Posted Feb 10, 2004
Authored by Manuel Lopez

MaxWebPortal is vulnerable to a cross site scripting and SQL injection attack.

tags | advisory, xss, sql injection
SHA-256 | 65e80d42d444a31c5162f9b48e912083c9be6b065c1960615740e01a0c6baed8

maxwebportal.txt

Change Mirror Download
 -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title: XSS, Sql Injection and Avatar ScriptCode Injection in MaxWebPortal

By: Manuel López

Vendor Description:
MaxWebPortal is a web portal and online community system which includes
advanced features such as web-based administration, poll, private/public
events calendar, user customizable color themes, classifieds, user control
panel, online pager, link, file, article, picture managers and much more.

Software:
MaxWebPortal

Severity:
Moderately critical

Impact:
Cross Site Scripting, Sql Injection, Avatar ScriptCode Injection.

Description:

- -- Cross Site Scripting --

An XSS vulnerability exists in the "sub_name" parameter of 'dl_showall.asp'
as well as the "SendTo" parameter in Personal Messages that allows arbitrary
code execution on the client-side browser.

Another XSS vulnerability exists in the script 'down.asp'.
<a href="<% =Request.ServerVariables("HTTP_REFERER") %>">Back</font></a></p>
This vulnerability exists via insufficient
sanitization of the the HTTP_REFERER, an attacker can create false
HTTP_REFERER headers which contain arbitrary HTML and script code.
<a href="<% =Request.ServerVariables("HTTP_REFERER") %>">Back</font></a></p>

- -- Sql Injection --

Another problem of sanitation in the "SendTo" parameter in Personal Messages
could lead an attacker to inject SQL code to manipulate and disclose various
information from the database.

- -- Avatar ScriptCode Injection --

The problem is in the 'register' form, it doesn't perform input validation
when inserting an image name of an Avatar into the database. This can be
exploited by a malicious user to inject arbitrary HTML or scriptcode instead
of an Avatar.
This can be used for example to steal another user's cookies if the user
visits a page where the attacker user's Avatar image would have been
displayed.

<select name="Avatar_URL" size="4" onChange ="if (CheckNav(3.0,4.0))
URL.src=form.Avatar_URL.options[form.Avatar_URL.options.selectedIndex].value
;">
<option
value="javascript:alert(document.cookie)">POC-Avatar</option></select>

Solution:
MaxWebPortal fixed the bugs
Update to version 1.32
http://www.maxwebportal.com

- ---- Credits ----
Manuel López ( mantra@gulo.org ) #IST
Special Thank´s: -- Aklis -- gulo.org

Kein, Skool, TheChakal, vientoS, |RDR|, NSR500, ^SaRgE^, VeNt0r, Kr0n0z..
and all the #IST staff.

Excuse me for speaking English so badly.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1

iD8DBQFAKC8plZD3/ZFHM4ERAvUuAJ9RBRGTfSurW9wbfXt8/6Rzmtw9dQCffJGO
v/5wnr9vEQs06foH8iXQ/NA=
=/ESJ
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close