Webify (Multiple Products) – Multiple HTML Injection / Local File Inclusions

  • 作者: snup
    日期: 2012-06-16
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/37415/
  • source: https://www.securityfocus.com/bid/54045/info
    
    Multiple Webify products are prone to multiple HTML-injection and local file-include vulnerabilities because they fail to properly sanitize user-supplied input.
    
    Exploiting these issues could allow an attacker to execute arbitrary HTML and script code in the context of the affected browser, steal cookie-based authentication credentials, and execute arbitrary local scripts in the context of the web server process. Other attacks are also possible.
    
    The following Webify products are vulnerable:
    
    Webify eDownloads Cart
    Webify eDownloads
    Webify Project Manager
    Webify Blog 
    
    Local file include:
    
    http://www.example.com/index.php?page=[LOCAL FILE INCLUDE]
    
    http://www.example.com/admin/index.php?page=[LOCAL FILE INCLUDE]
    
    HTML injection:
    
    http://www.example.com/admin/index.php?page=query [Persistent Script Code Inject via Query Value]
    
    http://www.example.com/admin/index.php?page=addobjects [Persistent Script Code Inject via addObject name Value]
    
    http://www.example.com/admin/index.php?page=formdesigner [Persistent Script Code Inject via former label Value]
    
    http://www.example.com/admin/index.php?page=comments [Persistent Script Code Inject via Comment text & name Value]
    
    http://www.example.com/admin/index.php?page=submissions [Persistent Script Code Inject via submission name Value]