lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050329131512.20517.qmail@www.securityfocus.com>
Date: 29 Mar 2005 13:15:12 -0000
From: PersianHacker Team <pi3ch@...oo.com>
To: bugtraq@...urityfocus.com
Subject: [PersianHacker.NET 200503-11]Ublog reload 1.0.4 and prior
    Multiple Vulnerbilities




[PersianHacker.NET 200503-11]Ublog reload 1.0.4 and prior Multiple Vulnerbilities
Date: 2005 03
Bug Number: 11

Ublog
Ublog reload is a complete ASP weblog system.
More info @:
http://www.uapplication.com


Discussion:
--------------------
What are the bugs ?
1) Cross-Site Scripting that lets attackers can inject HTML or Script.
2) Default Database Name.

Description bugs
1)
Input passed to the "msg" parameter in "login.asp" isn't properly sanitised before being returned to the user.
Example : 
2)
The problem is that the database file "mdb-database/ublogreload.mdb" is located inside the web root. so attackers can download it and disclose user/password of admin.
attention : the admin's password is in the hash formating.

Exploit:
--------------------
http://www.example.com/login.asp?msg=&lt;script&gt;alert(XSS)&lt;/script&gt;
http://www.example.com/mdb-database/ublogreload.mdb


Solution:
--------------------
Upgrade to ublog reaload version 1.0.5


Credit:
--------------------
Discovered by PersianHacker.NET Security Team
by 3nitro (3nitro [AT] persianhacker [DOT] net)
http://www.PersianHacker.NET

Special Thanks: Pi3cH


Help
--------------------
visit: http://www.PersianHacker.NET
or mail me @: 3nitro [AT] persianhacker [DOT] net


Note
--------------------
scripts authors contacted for this bug.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ