WiFi web access
+ + + + ++ +

+
diff --git a/files.csv b/files.csv index bd5f0ad0d..3f1609dd0 100755 --- a/files.csv +++ b/files.csv @@ -31167,3 +31167,15 @@ id,file,description,date,author,platform,type,port 34609,platforms/php/webapps/34609.txt,"MySource Matrix 'char_map.php' Multiple Cross Site Scripting Vulnerabilities",2010-09-06,"Gjoko Krstic",php,webapps,0 34610,platforms/php/webapps/34610.txt,"zenphoto 1.3 zp-core/full-image.php a Parameter SQL Injection",2010-09-07,"Bogdan Calin",php,webapps,0 34611,platforms/php/webapps/34611.txt,"Zenphoto 1.3 zp-core/admin.php Multiple Parameter XSS",2010-09-07,"Bogdan Calin",php,webapps,0 +34614,platforms/asp/webapps/34614.txt,"SmarterTools SmarterStats 5.3.3819 'frmHelp.aspx' Cross Site Scripting Vulnerability",2010-09-09,"David Hoyt",asp,webapps,0 +34616,platforms/php/webapps/34616.txt,"Elkagroup Elkapax 'q' Parameter Cross Site Scripting Vulnerability",2009-08-13,Isfahan,php,webapps,0 +34617,platforms/php/webapps/34617.txt,"Waverider Systems Perlshop Multiple Input Validation Vulnerabilities",2009-08-06,Shadow,php,webapps,0 +34618,platforms/php/webapps/34618.txt,"Omnistar Recruiting 'resume_register.php' Cross Site Scripting Vulnerability",2009-09-06,MizoZ,php,webapps,0 +34619,platforms/php/webapps/34619.txt,"PaysiteReviewCMS 1.1 search.php q Parameter XSS",2010-09-14,"Valentin Hoebel",php,webapps,0 +34620,platforms/php/webapps/34620.txt,"PaysiteReviewCMS image.php image Parameter XSS",2010-09-14,"Valentin Hoebel",php,webapps,0 +34621,platforms/unix/remote/34621.c,"Mozilla Firefox <= 3.6.8 'Math.random()' Cross Domain Information Disclosure Vulnerability",2010-09-14,"Amit Klein",unix,remote,0 +34622,platforms/windows/remote/34622.txt,"Axigen Webmail 1.0.1 Directory Traversal Vulnerability",2010-09-15,"Bogdan Calin",windows,remote,0 +34624,platforms/php/webapps/34624.txt,"OroCRM - Stored XSS Vulnerability",2014-09-11,Provensec,php,webapps,80 +34625,platforms/php/webapps/34625.py,"Joomla Spider Contacts 1.3.6 (index.php, contacts_id param) - SQL Injection",2014-09-11,"Claudio Viviani",php,webapps,80 +34626,platforms/ios/webapps/34626.txt,"Photorange 1.0 iOS - File Inclusion Vulnerability",2014-09-11,Vulnerability-Lab,ios,webapps,9900 +34627,platforms/ios/webapps/34627.txt,"ChatSecure IM 2.2.4 iOS - Persistent XSS Vulnerability",2014-09-11,Vulnerability-Lab,ios,webapps,0 diff --git a/platforms/asp/webapps/34614.txt b/platforms/asp/webapps/34614.txt new file mode 100755 index 000000000..ccf6f9a27 --- /dev/null +++ b/platforms/asp/webapps/34614.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/43110/info + +SmarterTools SmarterStats is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +SmarterTools SmarterStats 5.3.3819 is vulnerable; other versions may also be affected. + +https://www.example.com/UserControls/Popups/frmHelp.aspx?url='%22--%3E%3Cscript%3Ealert(0x0003DC)%3C/script%3E \ No newline at end of file diff --git a/platforms/ios/webapps/34626.txt b/platforms/ios/webapps/34626.txt new file mode 100755 index 000000000..0277f8e3c --- /dev/null +++ b/platforms/ios/webapps/34626.txt @@ -0,0 +1,462 @@ +Document Title: +=============== +Photorange v1.0 iOS - File Include Web Vulnerability + + +References (Source): +==================== +http://www.vulnerability-lab.com/get_content.php?id=1318 + + +Release Date: +============= +2014-09-07 + + +Vulnerability Laboratory ID (VL-ID): +==================================== +1318 + + +Common Vulnerability Scoring System: +==================================== +6.3 + + +Product & Service Introduction: +=============================== +The BEST and MOST Convenient Private Photo & Video & Docs App! Photorange provides a secure Password System to keep your +secret files 100% private. Your files are ONLY stored on your device and we can never touch them. + +( Copy of the Vendor Homepage: https://itunes.apple.com/en/app/photorange-schutz-privat-foto/id896041290 ) + + +Abstract Advisory Information: +============================== +The Vulnerability Laboratory discovered a local file include web vulnerability in the official Photorange v1.0 iOS mobile web-application. + + +Vulnerability Disclosure Timeline: +================================== +2014-09-08: Public Disclosure (Vulnerability Laboratory) + + +Discovery Status: +================= +Published + + +Affected Product(s): +==================== +Jiajun Kuang +Product: Photorange - iOS Mobile Web Application 1.0 + + +Exploitation Technique: +======================= +Local + + +Severity Level: +=============== +High + + +Technical Details & Description: +================================ +A local file include web vulnerability has been discovered in the official Photorange v1.0 iOS mobile web-application. +The local file include web vulnerability allows remote attackers to unauthorized include local file/path requests or +system specific path commands to compromise the mobile web-application. + +The web vulnerability is located in the `filename` value of the `add file` module. Remote attackers are able to inject own files with +malicious `filename` values in the `sync` device POST method request to compromise the mobile web-application. The local file/path include +execution occcurs in the file dir index web interface through the download path next to the vulnerable name/path value. The attacker is able +to inject the local file request by usage of the available `wifi interface` for file exchange via sync. + +Remote attackers are also able to exploit the filename validation issue in combination with persistent injected script codes to execute +different local malicious attack requests. The attack vector is on the application-side of the wifi service and the request method to +inject is POST via Sync. + +The security risk of the local file include web vulnerability is estimated as high with a cvss (common vulnerability scoring system) +count of 6.3. Exploitation of the local file include web vulnerability requires no privileged web-application user account but low +user interaction. Successful exploitation of the local file include web vulnerability results in mobile application or connected +device component compromise. + + +Request Method(s): + [+] [Sync] [POST] + +Vulnerable Parameter(s): + [+] filename + +Affected Module(s): + [+] Index File Dir Listing (Web Interface - http://localhost:9900/ ) + + +Proof of Concept (PoC): +======================= +The local file include web vulnerability can be exploited by local attackers without privileged application user account or user interaction. +For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. + +PoC: Exploit +http://localhost:9900/%3E%22%3E%3C./[LOCAL FILE INCLUDE VULNERABILITY!]%3E.TXT +http://localhost:9900/Download/%3E%22%3E%3C./[LOCAL FILE INCLUDE VULNERABILITY!]%3E.TXT + + + +PoC: Web Interface - Index Dir Listing + +
+ +