ehomes suffers from multiple cross site scripting and SQL injection vulnerabilities.
c0a29d66c0cab2f31e0b3e9b6c0e816e83743419fc62e099aa38cf6ac98d2b08
vendor site: http://enthrallweb.us/
product : ehomes
bug:injection sql
risk : medium
injection sql :
/dircat.asp?cid='[sql]
/dirSub.asp?sid='[sql]
/types.asp?TYPE_ID='[sql]
/homeDetail.asp?AD_ID='[sql]
/result.asp?city=1&cat='[sql]
/compareHomes.asp?compare='[sql]
/compareHomes.asp?compare=Compare&clear='[sql]
/compareHomes.asp?compare=Compare&clear=Clear&adID='[sql]
/result.asp?city=1&cat=2&imageField2=1&State=1&aminprice='[sql]
/result.asp?city=1&cat=2&imageField2=1&State=1&aminprice=0&amaxprice='[sql]
/result.asp?city=1&cat=2&imageField2=1&State=1&aminprice=0&amaxprice=10000000&abedrooms='[sql]
xss get :
/result.asp?city=[xss]
/result.asp?city=1&cat=2&imageField2=1&State=[xss]
laurent gaffié & benjamin mossé
http://s-a-p.ca/
contact: saps.audit@gmail.com