lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 29 Aug 2012 15:28:14 GMT
From: admin@...elweiss.info
To: bugtraq@...urityfocus.com
Subject: Sistem Biwes Multiple Vulnerability

===================================================================
		Sistem Biwes Multiple Vulnerability
===================================================================

Author: eidelweiss (@randyarios)
Product / software: SISTEM BIWES
Vendor Site: http://sistembiwes.com/
Product Price: RM240 / year


Product Description:
 
Sistem Bina Website Sendiri(Biwes)
Sistem Bina Website Sendiri atau lebih dikenali dengan nama Sistem Biwes adalah sistem bina website sendiri berkonsepkan DIY(Do It Yourself).
Ia memberi peluang kepada mereka yang ingin mengendalikan website sendiri tetapi tidak mempunyai pengetahuan tentang website.

Cara penggunaannya iaitu anda masukkan kandungan website, sistem secara automatik akan mencipta menu bagi page baru.
Bagi website e-commerce pula sistem ini digabungkan dengan sistem shopping cart dan sistem pembayaran.

Sistem ini sesuai untuk produk digital ataupun fizikal. Bilangan produk yang sedikit ataupun bilangan produk yang banyak

===================================================================

Vulnerability:
Due to improper input sanitation, parameters are prone to SQL injection, Dir Listing
and Full Path Disclosure Vulnerability.

p0c 1: SQL Injection
Page: index.php
Vulnerable param: 'produkId'
http://host/index.php?c=[valid num]&a=cartM2&produkId=[inject here]

p0c 3: Full Path Disclosure (FPD)
path: multiple
page: multiple


Demo:
http://host/webs/admin/index.php

Warning: require_once(form_login.php) [function.require-once]: failed to open stream: No such file or directory in /home/[TARGET]/public_html/webs/admin/index.php on line 21

Fatal error: require_once() [function.require]: Failed opening required 'form_login.php' (include_path='.:/usr/lib/php:/usr/local/lib/php') in /home/[TARGET]/public_html/webs/admin/index.php on line 21

And many other path also vuln.

===================================================================
   
==========================| -=[ E0F ]=- |==========================

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ