[<prev] [next>] [day] [month] [year] [list]
Message-ID: <38f2c0670601151033n6a2641d9w@mail.gmail.com>
Date: Sun Jan 15 18:33:50 2006
From: siegfri3d at gmail.com (Siegfried)
Subject: EZDatabase Directory Transversal,
XSS and Path Disclosure Vulnerability
> The $p variable is not properly sanitized in index.php. Note the code in
> index.php tacks on a ".php" to any file requested.
the fact that it adds ".php" to it isn't a problem in itself, if it
filters directory traversal sequences. can you confirm it doesn't?
maybe posting a piece of code.. the product isn't free
2006/1/15, Josh Zlatin <josh_at_ramat.cc> :
> Synopsis: EZDatabase directory transversal, XSS and path disclosure
> vulnerability
>
> Product: EZDatabase
> http://www.ezdatabase.org
>
> Version: Confirmed on EZDatabase < 2.1.2
>
> Author: Josh Zlatin-Amishav
>
> Date: January 15, 2006
>
> Background:
> Written in PHP and MySQL, ezDatabase is the foundation for your online
> databases. It is a powerful web based application that allows even
> non-technical users to create online databases for their website.
> ezDatabase will do the hard work while you concentrate on building the
> databases you want.
>
> Issue:
> The $p variable is not properly sanitized in index.php. Note the code in
> index.php tacks on a ".php" to any file requested.
>
> PoC:
> http://localhost/index.php?db_id=1&cat_id=1&display=30&p=%3Cscript%3Ealert(document.cookie)%3C/script%3E&rowstart=90
>
> References:
> http://www.ezdatabase.org
> http://zur.homelinux.com/Advisories/ezdatabase_dir_trans.txt
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Powered by blists - more mailing lists