GenesisTrader Multiple Input Validation Vulnerabilities
BID:21595
Info
GenesisTrader Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 21595 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 14 2006 12:00AM |
| Updated: | Dec 15 2006 07:48PM |
| Credit: | Mr_KaLiMaN is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
genesis-php.com GenesisTrader 1.0 |
| Not Vulnerable: | |
Discussion
Exploit / POC
GenesisTrader Multiple Input Validation Vulnerabilities
An attacker can exploit the information-disclosure and arbitrary file-upload vulnerabilities via a web client. An attacker can exploit the cross-site scripting issue by enticing an unsuspecting victim to follow a malicious URI.
The following proof-of-concept URIs are available:
http://www.example.com/index.php?cuve=[XSS]
http://www.example.com/form.php?floap=ajoutfich&cuve=[XSS]
http://www.example.com/form.php?floap=modfich&chem=[XSS]
http://www.example.com/form.php?floap=modfich&do=[XSS]
http://www.example.com/form.php?floap=rename&chem=[XSS]
http://www.example.com/form.php?floap=rename&do=[XSS]
http://www.example.com/form.php?floap=copy&chem=[XSS]
http://www.example.com/form.php?floap=copy&do=[XSS]
http://www.example.com/form.php?floap=chmod&chem=[XSS]
http://www.example.com/form.php?floap=chmod&do=[XSS]
http://www.example.com/form.php?floap=modfich&do=[FILE]
http://www.example.com/form.php?floap=modfich&chem=[FILE]
http://www.example.com/form.php?floap=ajoutfich
An attacker can exploit the information-disclosure and arbitrary file-upload vulnerabilities via a web client. An attacker can exploit the cross-site scripting issue by enticing an unsuspecting victim to follow a malicious URI.
The following proof-of-concept URIs are available:
http://www.example.com/index.php?cuve=[XSS]
http://www.example.com/form.php?floap=ajoutfich&cuve=[XSS]
http://www.example.com/form.php?floap=modfich&chem=[XSS]
http://www.example.com/form.php?floap=modfich&do=[XSS]
http://www.example.com/form.php?floap=rename&chem=[XSS]
http://www.example.com/form.php?floap=rename&do=[XSS]
http://www.example.com/form.php?floap=copy&chem=[XSS]
http://www.example.com/form.php?floap=copy&do=[XSS]
http://www.example.com/form.php?floap=chmod&chem=[XSS]
http://www.example.com/form.php?floap=chmod&do=[XSS]
http://www.example.com/form.php?floap=modfich&do=[FILE]
http://www.example.com/form.php?floap=modfich&chem=[FILE]
http://www.example.com/form.php?floap=ajoutfich
Solution / Fix
GenesisTrader Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
References
GenesisTrader Multiple Input Validation Vulnerabilities
References:
References:
- Vendor Home Page (www.genesis-php.com)
- GenesisTrader v1.0 - Multiple Vulnerabilities ([email protected])