Exploit the possiblities

ReviewPost.txt

ReviewPost.txt
Posted Jan 5, 2005
Authored by James Bercegay | Site gulftech.org

GulfTech Security Research - ReviewPost PHP Pro versions below 2.84 suffer from cross site scripting and SQL injection attacks. Sample exploitation given.

tags | exploit, php, xss, sql injection
MD5 | cc9424064ae6b740688d1fdf641acd1d

ReviewPost.txt

Change Mirror Download


##########################################################
# GulfTech Security Research January 02, 2005
##########################################################
# Vendor : All Enthusiast, Inc.
# URL : http://www.reviewpost.com/
# Version : ReviewPost PHP Pro All Versions
# Risk : Multiple Vulnerabilities
##########################################################



Description:
Your community of users represents a wealth of knowledge. Now
your users can help build and maintain your site by writing
reviews of any product imaginable. With ReviewPost, you will
quickly amass a valuable collection of user opinions about
products that relate to your site. ReviewPost can even use
your existing forum login system (if you have one) to keep your
users from having to register twice, and makes an excellent
companion to ReviewPost. Where you see [INT] in this advisory,
it represents an integer such as a valid category. [XSS] and
[SQL] represent where an attacker could insert code to conduct
a cross site scripting attack, or inject data to influence SQL
queries.



Cross Site Scripting:
ReviewPost is prone to cross site scripting in several
different scripts throughout the application.

http://path/showcat.php?si=[XSS]
http://path/showproduct.php?product=[INT]&sort=[INT]&cat=[INT][XSS]
http://path/showproduct.php?product=[INT]&sort=[INT]&cat=[INT]&page=[INT][XS
S]
http://path/reportproduct.php?report=[INT][XSS]

This can be used to render hostile code in the context of the
victims browser, or to steal cookie based credentials or other
sensitive info.



SQL Injection Vulnerabilities:
There are a couple of SQL Injection vulnerabilities in ReviewPost.
Some are easy to exploit, others are not so easy. Examples are below:

http://path/showcat.php?cat=[INT][SQL]
http://path/addfav.php?product=[INT][SQL]&do=add

These SQL issues can possibly be exploited to influence SQL queries
and disclose arbitrary data. These will alse cause XSS if unsuccessful.



Arbitrary File Upload:
This issue can be very dangerous as it allows a user to upload php
scripts and other files. Once uploaded these files can be executed
with the permission of the webserver. The uploaded file can be
found by following the image link in the Review that was posted.
Exploiting this vulnerability can be accomplished by naming a file with
multiple file extensions and then uploading it when posting a review
(for example: test.jpg.php.jpg.php). It should be noted that the uploads
are properly filtered (or seem to be) when editing a review, just not when
creating a new Review.



Solution:
ReviewPost 2.84 has been released to address these issues. Users should
upgrade their installation as soon as possible.



Related Info:
The original advisory can be found at the following location
http://www.gulftech.org/?node=research&article_id=00062-01022005



Credits:
James Bercegay of the GulfTech Security Research Team

--
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.296 / Virus Database: 265.6.7 - Release Date: 12/30/2004


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    7 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close