Monday, 14 May 2012

Swoopo Gold Shop CMS v8.4.56 - Multiple Web Vulnerabilities


Title:
======
Swoopo Gold Shop CMS v8.4.56 - Multiple Web Vulnerabilities


Date:
=====
2012-05-14


References:
===========
http://www.vulnerability-lab.com/get_content.php?id=515


VL-ID:
=====
515


Common Vulnerability Scoring System:
====================================
8.5


Introduction:
=============
Swoopo Gold is a shop content management system coded with PHP, Jsp & connected via MySQL Database. 

    Scratch Auction.
    Future Auction.
    Buy-now system.
    Bid-back System.
    Referral System.
    Offline order processing.
    Change shipping status from Admin-Panel.
    Captcha at registration.
    Display bid-type at bid history.
    Display return-policy in auction details page.
    Advance Autobidder.
    Banner rotator.
    1 year free technical support.
    No Encryption.
    No Callback.
    Standard Auction, Penny Auction, Beginner Auction, 10 Second Auction, 15 Second Auction, 20 Second Auction
    User registration and account verification.
    Member login, account updating, purchasing more bids and paying for won auctions features.
    Buying bid packages.
    Set bidding packages.
    Bidding in the Penny Auction format. Pay per bid and the price increment by a set amount.
    Time increment by 10 seconds (can be changed in the CMS) each time a bid is placed.
    Bid butler system - the ability for users tobook their bids.
    An editable “Terms and conditions” and “Help section” page. Additional pages can also be incorporated.
    A newsletter sign up system and sending capability.
    Update & add the latest news articles.
    Send newsletters to members signed up for the newsletter.
    Paypal as the default payment gateway.
    Users can receive free bids for registering, for winning their first auction and for buying bid packages for the first time.
    View, edit, add, delete and suspend users.
    Add, edit, delete and clone
    Limits on the number of auctions a user can win.
    Winning bidder can be viewed and the auction status can be update - e.g. paid, awaiting shipping, shipped and completed.
    View users bidding history, purchased bid packages, add free bids to the user and refund bids for the user.
    View referrals from users.
    Coupons module.
    Rewards points system when packages are purchased.
    Credit system for auctions which users lose, which can be used for won auctions.
    Manage unlimited website categories viz. add, edit and delete.
    Edit general website settings viz. turning on and off various features.
    Add, edit and delete countries that you want to include.

(Copy of the Vendor Homepage: http://itechscripts.com/swoopo_clone.html )


Abstract:
=========
The Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in ITtechScripts Swoopo Gold Shop CMS v8.4.56.


Report-Timeline:
================
2012-05-14: Public or Non-Public Disclosure


Status:
========
Published


Affected Products:
==================
ITechScripts
Product: Swoopo Gold Shop CMS v8.4.56


Exploitation-Technique:
=======================
Remote


Severity:
=========
Critical


Details:
========
Details about the bug on http://www.vulnerability-lab.com/get_content.php?id=515


Risk:
=====
1.1
The security risk of the remote sql injection vulnerability is estimated as critical.

1.2
The security risk of the blind sql injection vulnerability is estimated as critical.

2.1
The security risk of the persistent input validation vulnerabilities are estimated as medium(+).

2.2
The security risk of the non-persistent cross site scripting vulnerabilities are estimated as low(+).


Credits:
========
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri  (Rem0ve) & Ibrahim El-Sayed (the St0rm)


Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply.

Domains: www.vulnerability-lab.com   - www.vuln-lab.com
Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com
Contact: admin@vulnerability-lab.com - support@vulnerability-lab.com - irc.vulnerability-lab.com

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab Research Team or its suppliers.

          Copyright © 2012 Vulnerability-Lab


Friday, 11 May 2012

NetBill Billing System v1.2 - Multiple Web Vulnerabilities




Title:
======
NetBill Billing System v1.2 - Multiple Web Vulnerabilities


Date:
=====
2012-05-11


References:
===========
http://www.vulnerability-lab.com/get_content.php?id=560


VL-ID:
=====
560


Common Vulnerability Scoring System:
====================================
3.5


Introduction:
=============
NetBill - Client Control & Billing System - NetBill is an open source web application optimized to 
fuse customer support, project management, communications, and direct billing to enhance conversions 
and service management. Integrated within the core of the NetBill platform is well-thought automation 
and user centric functionality that is pre-configured to selectively enhance your operations 
and productivity.

(Copy of the vendor Homepage: http://www.vessio.com )


Abstract:
=========
The Vulnerability Laboratory Research Team discovered a CSRF- and multiple persistent Web 
Vulnerabilities in the NetBill v1.2 web application.


Report-Timeline:
================
2012-05-11: Public or Non-Public Disclosure


Status:
========
Published


Exploitation-Technique:
=======================
Remote


Severity:
=========
Medium


Details:
========
1.1
Multiple persistent input validation vulnerabilities are detected in the NetBill v1.2 web application.
The bugs 
allow remote attackers to implement/inject malicious script code on the application side (persistent). 

Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) 
context manipulation. 
Exploitation requires low user inter action.

Vulnerable Module(s):

    [+] /accounts/admin/index.php?user=59902561 - user Full Name
    [+] /accounts/admin/index.php?user=59902561 - add file (Title - Description)
    [+] /accounts/index2.php?page=support - Inject via support request (Details)


Picture(s):
    ../1.png
    ../2.png
    ../3.png


1.2
A cross site request forgery vulnerability is detected in  in NetBill v1.2  web application. The bugs allow remote attackers with 
high required user inter action to edit user accounts. Successful exploitation can lead to account creation. To exploit 
the issue the attacker need to create a manipulated copy the edit user mask/form. Inside of the document the remote 
can implement his own values for the update because of no form or token protection. When admin get now forced to execute 
the script via link he is executing the new value on the update of the application if his session is not expired.

Vulnerable Module(s):

    [+] /accounts/admin/index.php?action=new-client - Add New Account

Picture(s):
    ../4.png


Risk:
=====
1.1
The security risk of the persistent input validation vulnerability is estimated as medium.

1.2 
The security risk of the cross site request forgery vulnerability is estimated as low(+).


Credits:
========
Vulnerability Laboratory [Research Team]   -    the_storm (storm@vulnerability-lab.com)


Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply.

Domains: www.vulnerability-lab.com   - www.vuln-lab.com
Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com
Contact: admin@vulnerability-lab.com - support@vulnerability-lab.com - irc.vulnerability-lab.com

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab Research Team or its suppliers.

          Copyright © 2012 Vulnerability-Lab


Travelon Express CMS v6.2.2 - Multiple Web Vulnerabilities

This summary is not available. Please click here to view the post.

Wednesday, 9 May 2012

Proman Xpress v5.0.1 - Multiple Web Vulnerabilities



Title:
======
Proman Xpress v5.0.1 - Multiple Web Vulnerabilities


Date:
=====
2012-05-09


References:
===========
http://www.vulnerability-lab.com/get_content.php?id=513


VL-ID:
=====
512


Common Vulnerability Scoring System:
====================================
7.5


Introduction:
=============
Proman Xpress v5.0.1 is a super project management script coded in PHP & MySQL. It s highly customizable and 
is used across industries.

No Encryption.
No Callback.
Separate login for clients.
Easy management.
Add/edit/delete projects.
Unlimited project category.
Unlimited image upload.
Ajax based interface.
Complete messaging system.
File attachment system.
Active/ inactive projects.
Assign different parts to staffs.
Client to admin message interface.
Staff to admin message interface.
Set project time period.
Add/edit/delete clients.
Add/edit/delete Staffs.
Template based architecture.

(Copy of the Vendor Homepage:  http://itechscripts.com/proman_xpress.html )


Abstract:
=========
The Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in Proman Xpress 2012 Q2.


Report-Timeline:
================
2012-05-09: Public or Non-Public Disclosure


Status:
========
Published


Exploitation-Technique:
=======================
Remote


Severity:
=========
High


Details:
========
1.1
A remote SQL Injection vulnerability  is detected in the Promans Xpress 2012 Q2 content management system.
The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands 
on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise.
The vulnerability is located on the username post method.

Vulnerable Module(s):
      [+] Category Edit  [category_edit.php?cid=]
      
Picture(s):
      ../1.png
      ../2.png


1.2
A persistent input validation vulnerability is detected n the Promans Xpress 2012 Q2 content management system.
The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent).
Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) 
context manipulation. Exploitation requires low user inter action. The bug is located on the comment section of 
the message reply function.


Vulnerable Module(s):
      [+] Replying for a Message - Comments 

Picture(s):
      ../3.png
      ../4.png


Risk:
=====
1.1
The security risk of the sql injection vulnerability is estimated as high(-).

1.2
The security risk of the persistent input validation vulnerability is estimated as medium(+).


Credits:
========
Vulnerability Laboratory [Research Team]   -    the storm  (storm@vulnerability-lab.com)


Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply.

Domains: www.vulnerability-lab.com   - www.vuln-lab.com
Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com
Contact: admin@vulnerability-lab.com - support@vulnerability-lab.com - irc.vulnerability-lab.com

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab Research Team or its suppliers.

          Copyright © 2012 Vulnerability-Lab


Monday, 7 May 2012

Free Reality v3.1-0.6 - Multiple Web Vulnerabilities



Title:
======
Free Reality v3.1-0.6 - Multiple Web Vulnerabilities


Date:
=====
2012-05-07


References:
===========
http://www.vulnerability-lab.com/get_content.php?id=513


VL-ID:
=====
513


Common Vulnerability Scoring System:
====================================
7.5


Introduction:
=============
Free Realty is primarily designed for real estate agents and offices to list properties on the internet. With Free Realty the end 
user does not need to be fluent in web page design. Read more in the demo site
This is a fork of 
software written by Jon Roig called Open Realty. Jon has moved on to version 3.0 while a number of users have requested 
continued development on the 2.x series. Other sites of note regarding 2.x development 
www.1axn.com/gi-bin/openforum/ikonboard.cgi the original discussion board, before Jon opened up his own. 

(Copy of the Vendor Homepage:  http://freerealty.rwcinc.net  )


Abstract:
=========
A Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in the Free Reality v3.1-0.6 web application.


Report-Timeline:
================
2012-05-07: Public or Non-Public Disclosure


Status:
========
Published


Exploitation-Technique:
=======================
Remote


Severity:
=========
Critical


Details:
========
1.1
A remote SQL Injection vulnerability is detected in the Free Reality v3.1-0.6 web application. 
The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on 
the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise.

Vulnerable Module(s):
     [+] agentdisplay.php?view=
     [+] /admin/admin.php?edit=

1.2
Multiple persistent input validation vulnerabilities are detected in the Free Reality v3.1-0.6 web application.
The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). 
Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. 
Exploitation requires low user inter action.
                                       
Vulnerable Module(s):
     [+] admin/agenteditor.php - inject  notes about the Agent
     [+] agentadmin.php?edit=2 - inject title / preview description: / Long description: / notes
     [+] agentadmin.php?action=addlisting inject title / preview description: / Long description: / notes
     [+] admin/adminfeatures.php - Add new feature


1.3
A cross site request forgery vulnerability is detected in  in the Free Reality v3.1-0.6 web application. The bugs allow remote 
attackers with high required user inter action to edit user accounts. Successful exploitation can lead to account access.
To exploit the issue the attacker need to create a manipulated copy the edit user mask/form. Inside of the document the 
remote can implement his own values for the update because of no form or token protection. When admin get now forced to 
execute the script via link he is executing the new value on the update of the application if his session is not expired.

Vulnerable Module(s):
     [+] admin/agenteditor.php?action=addagent - Add agent
     [+] admin/agenteditor.php?adminmodify=2 - Modify Agent


Risk:
=====
1.1
The security risk of the remote SQL injection vulnerability is estimated as critical.

1.2
The security risk of the persistent input validation vulnerability is estimated as medium.

1.3 
The security risk of the cross site request forgery vulnerability is estimated as low(+).


Credits:
========
Vulnerability Laboratory [Research Team]   -    the_storm (storm@vulnerability-lab.com)


Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply.

Domains: www.vulnerability-lab.com   - www.vuln-lab.com
Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com
Contact: admin@vulnerability-lab.com - support@vulnerability-lab.com - irc.vulnerability-lab.com

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab Research Team or its suppliers.

          Copyright © 2012 Vulnerability-Lab


Tuesday, 1 May 2012

MYRE Real Estate Mobile 2012|2 - Multiple Web Vulnerabilities



Title:
======
MYRE Real Estate Mobile 2012|2 - Multiple Web Vulnerabilities


Date:
=====
2012-05-01


References:
===========
http://www.vulnerability-lab.com/get_content.php?id=516


VL-ID:
=====
516


Introduction:
=============
Best solution for a professional Real Estate management software. Try MYRE Real Estate Mobile Software, Real 
Estate ready-to-use software best solution for a professional Real Estate management software. Try MYRE Real 
Estate Software, Real Estate ready-to-use software. At MYRE Real Estate Software, we offer professional solutions 
for your Real Estate business needs, including turn-key operations. That\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'s right, turn-key! Start your real 
estate business today with MYRE Real Estate Mobile Software and get into the real estate market the same day. 

    Businesses for sale
    Commercial properties for lease
    Commercial properties for sale
    Real estate properties for sale
    Real estate properties for rent
    Holiday rentals
    Or any combination

MYRE Real Estate Software provides a complete realty listing management solution. It is easily customized to reflect 
your creativity whether you are starting from scratch or integrating it into an existing web site. MYRE Real Estate 
Software can be used to promote residential as well as commercial rentals. This software is suitable for an 
independent agent site, or the listings section of your brokerage and/or real estate agency web site.

(Copy of the Vendor Homepage: http://www.myrephp.com &  http://myrephp.com/realestate/1_mobile/ )


Abstract:
=========
The Vulnerability Laboratory Researcher Team discovered multiple Vulnerabilities in MYREs Real Estate Mobile Application (2012 Q2).


Report-Timeline:
================
2012-05-01: Public or Non-Public Disclosure


Status:
========
Published


Exploitation-Technique:
=======================
Remote


Severity:
=========
Critical


Details:
========
1.1
Multiple remote SQL Injection vulnerabilities are detected in MYREs Real Estate Mobile Application (2012 Q2).
The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands 
on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise.
The vulnerability is located on the link_idd & userid value of the mobile application.

Vulnerable Module(s):
    [+] Listings - Link_IDD
    [+] Agent Profile - UserID

Picture(s):
    ../1.png
    ../2.png


1.2
Multiple non persistent cross site scripting vulnerabilities are detected in MYREs Real Estate Mobile Application (2012 Q2).
The vulnerability allows remote attackers to hijack website customer, moderator or admin sessions with high required 
user inter action or local low privileged user account. Successful exploitation can result in account steal, phishing 
& client-side content request manipulation.

Vulnerable Module(s):
    [+] Search - bedrooms1
    [+] Search - price2

Picture(s):
    ../3.png
    ../4.png


Risk:
=====
1.1
The security risk of the sql injection vulnerabilities are estimated as critical.

1.2
The security risk of the non persistent cross site scripting vulnerabilities are estimated as low(+).


Credits:
========
Vulnerability Laboratory [Research Team] -  Ibrahim M. El-Sayed  [the_storm] (the_storm@mail.com)


Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab or its suppliers.

          Copyright © 2012 Vulnerability-Lab


Format Factory - Multiple Buffer Overflow Vulnerabilities[Video Tutorial]

This is my first BOF bug. Thank you Benjamen (rem0ve).
I really appreciate your help :) Thank you bro
Title:
======
Format Factory - Multiple Buffer Overflow Vulnerabilities


Date:
=====
2012-05-01


References:
===========
Download: http://www.vulnerability-lab.com/resources/videos/539.wmv
View:   http://www.youtube.com/watch?v=Attyl__UIjY
Article: http://www.vulnerability-lab.com/get_content.php?id=539



VL-ID:
=====
539


Status:
========
Published


Exploitation-Technique:
=======================
Offensiv


Severity:
=========
Critical


Details:
========
The following video has been produced by Ibrahim El-Sayed & Benjamin Kunz Mejri. The video is about how to identify different 
local stack- & buffer overflow vulnerabilities in the format factory software. The video is splitted in 2 parts of exploitation.

1. Local Buffer overflow without overwrite registers
2. Local Buffer Overflow with overwrite ECX registers
3. Local Stack Buffer Overflow with overwrite EIP registers

The video teach you how to discover different type of local buffer overflows. Enjoy the video & send it to your friends to share experience. 


Credits:
========
Vulnerability Laboratory [Research Team] -   Benjamin Kunz Mejri  (Rem0ve)


Disclaimer:
===========
The information provided in this video is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab or its suppliers.

          Copyright © 2012  Vulnerability-Lab


Format Factory v2.95 - Buffer Overflow Vulnerabilities



Title:
======
Format Factory v2.95 - Buffer Overflow Vulnerabilities


Date:
=====
2012-05-01


References:
===========
http://www.vulnerability-lab.com/get_content.php?id=536
http://www.vulnerability-lab.com/get_content.php?id=539


VL-ID:
=====
536


Introduction:
=============
Format Factory is a multifunctional media converter. Provides functions below ...

- All to MP4/3GP/MPG/AVI/WMV/FLV/SWF.
- All to MP3/WMA/AMR/OGG/AAC/WAV.
- All to JPG/BMP/PNG/TIF/ICO/GIF/TGA.
- Rip DVD to video file , Rip Music CD to audio file. 
- MP4 files support iPod/iPhone/PSP/BlackBerry format.
- Supports RMVB,Watermark, AV Mux.

Format Factory`s Feature:

- support converting all popular video,audio,picture formats to others.
- Repair damaged video and audio file.
- Reducing Multimedia file size.
- Support iphone,ipod multimedia file formats.
- Picture converting supports Zoom,Rotate/Flip,tags.
- DVD Ripper.
- Supports 60 languages

- All Windows OS

(Copy of the Vendor Homepage: http://www.formatoz.com )


Abstract:
=========
The Vulnerability Laboratory Research Team discovered multiple Buffer Overflow Vulnerabilities in Format Factory v2.95 Software.


Report-Timeline:
================
2012-05-01: Public or Non-Public Disclosure


Status:
========
Published


Affected Products:
==================
Free Time
Product: Format Factory v2.95


Exploitation-Technique:
=======================
Local


Severity:
=========
Critical


Details:
========
1.1
A Buffer Overflow vulnerability is detected in Format Factory v2.95 Software.
The vulnerability allows an local attacker to overwrite the ecx & eip to control the affected vulnerable process.
Successful exploitation can result is privilege escalation with system access rights of the affected vulnerable 
software process. The vulnerability is located on the Custom Profile module when processing to add a file.


Vulnerable Module(s):
    [+] Custom Profile - File Add


--- Error Report (System) ---
Version=1
EventType=BEX
EventTime=129801306605752827
ReportType=2
Consent=1
ReportIdentifier=0140e860-918d-11e1-ba1b-a7b309768cde
IntegratorReportIdentifier=0140e85f-918d-11e1-ba1b-a7b309768cde
WOW64=1
Response.type=4
Sig[0].Name=Anwendungsname
Sig[0].Value=FormatFactory.exe
Sig[1].Name=Anwendungsversion
Sig[1].Value=2.95.0.0
Sig[2].Name=Anwendungszeitstempel
Sig[2].Value=4f848c41
Sig[3].Name=Fehlermodulname
Sig[3].Value=StackHash_059a
Sig[4].Name=Fehlermodulversion
Sig[4].Value=0.0.0.0
Sig[5].Name=Fehlermodulzeitstempel
Sig[5].Value=00000000
Sig[6].Name=Ausnahmeoffset
Sig[6].Value=00410041                 <=  ecx overwritten
Sig[7].Name=Ausnahmecode
Sig[7].Value=c0000005
Sig[8].Name=Ausnahmedaten

... &

EventType=APPCRASH
EventTime=129801310355837320
ReportType=2
Consent=1
ReportIdentifier=e0c79250-918d-11e1-ba1b-a7b309768cde
IntegratorReportIdentifier=e0c7924f-918d-11e1-ba1b-a7b309768cde
WOW64=1
Response.type=4
Sig[0].Name=Anwendungsname
Sig[0].Value=FormatFactory.exe
Sig[1].Name=Anwendungsversion
Sig[1].Value=2.95.0.0
Sig[2].Name=Anwendungszeitstempel
Sig[2].Value=4f848c41
Sig[3].Name=Fehlermodulname
Sig[3].Value=FormatFactory.exe
Sig[4].Name=Fehlermodulversion
Sig[4].Value=2.95.0.0
Sig[5].Name=Fehlermodulzeitstempel
Sig[5].Value=4f848c41
Sig[6].Name=Ausnahmecode
Sig[6].Value=c0000005
Sig[7].Name=Ausnahmeoffset
Sig[7].Value=00008f53


Picture(s):
    ../1.png
    ../2.png



1.2
A Buffer Overflow vulnerability is detected in Format Factory v2.95 Software. The Buffer Overflow Vulnerability is 
located when processing to load large file names. Successful exploitation results in a local null ptr buffer overflow.
Attackers can form or load files (local) large names or extension name to crash the software stable when processing to 
save the input. The vulnerability did not allow to overwrite any registers of the affected vulnerable process. 



--- Error Report (System) ---
Problem Event Name:  BEX
Application Name:  FormatFactory.exe
Application Version:  2.60.0.0
Application Timestamp:  4cd197df
Fault Module Name:  MSVCR100.dll
Fault Module Version:  10.0.30319.1
Fault Module Timestamp:  4ba1dbbe
Exception Offset:  0008ae6e
Exception Code:   c0000417
Exception Data:   00000000
OS Version:   6.1.7600.2.0.0.256.1
Locale ID:   1033
Additional Information 1: e07f
Additional Information 2: e07f7afc2abe4439f8a8f96d499e3027
Additional Information 3: 5154
Additional Information 4: 515482f92719c2dc6fc04ebc97d28463



Picture(s):
    ../3.png
    ../4.png



1.3
A Buffer Overflow vulnerability is detected in Format Factory v2.95 Software. The Buffer Overflow Vulnerability is 
located in the *.ini configuration file when processing to load the maxwidth size. Local attackers can implement 
or replace the ini settings to overwrite the EIP register. Successful exploitation can result is privilege escalation 
with system access rights of the affected vulnerable software process.

Vulnerable Module(s):
    [+] INI - Width & Height - Size & Buffer Validation


--- Error Report (System) ---
EventType=BEX
EventTime=129801380523760695
ReportType=2
Consent=1
ReportIdentifier=371c0b8c-919e-11e1-ba1b-a7b309768cde
IntegratorReportIdentifier=371c0b8b-919e-11e1-ba1b-a7b309768cde
WOW64=1
Response.type=4
Sig[0].Name=Anwendungsname
Sig[0].Value=FormatFactory.exe
Sig[1].Name=Anwendungsversion
Sig[1].Value=2.95.0.0
Sig[2].Name=Anwendungszeitstempel
Sig[2].Value=4f848c41
Sig[3].Name=Fehlermodulname
Sig[3].Value=StackHash_059a
Sig[4].Name=Fehlermodulversion
Sig[4].Value=0.0.0.0
Sig[5].Name=Fehlermodulzeitstempel
Sig[5].Value=00000000
Sig[6].Name=Ausnahmeoffset
Sig[6].Value=41414141    <=  overwritten register EIP
Sig[7].Name=Ausnahmecode
Sig[7].Value=c0000005
Sig[8].Name=Ausnahmedaten
Sig[8].Value=00000008
DynamicSig[1].Name=Betriebsystemversion
DynamicSig[1].Value=6.1.7601.2.1.0.768.3
DynamicSig[2].Name=Gebietsschema-ID
DynamicSig[2].Value=1031
DynamicSig[22].Name=Zusatzinformation 1
DynamicSig[22].Value=059a
DynamicSig[23].Name=Zusatzinformation 2
DynamicSig[23].Value=059a393e1c4f8097b3d5573aa130c733
DynamicSig[24].Name=Zusatzinformation 3
DynamicSig[24].Value=563a
DynamicSig[25].Name=Zusatzinformation 4
DynamicSig[25].Value=563a7086139512fa1af4651c2e9f9f50


Picture(s):
    ../5.png
    ../6.png


Risk:
=====
1.1
The security risk of the local buffer overflow vulnerability is estimated as high(-).

1.2
The security risk of the local buffer overflow vulnerability is estimated as medium(+).

1.3
The security risk of the local buffer overflow vulnerability is estimated as high(-).


Credits:
========
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (Rem0ve) [rem0ve@vulnerability-lab.com]
Vulnerability Laboratory [Research Team] - Ibrahim El-Sayed (the_storm) [storm@vulnerability-lab.com]


Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab or its suppliers.

          Copyright © 2012  Vulnerability-Lab


Real Estates Property CMS 2012 - Multiple Web Vulnerabilities



Title:
======
Real Estates Property CMS 2012 - Multiple Web Vulnerabilities


Date:
=====
2012-05-02


References:
===========
http://www.vulnerability-lab.com/get_content.php?id=500


VL-ID:
=====
500


Introduction:
=============
Real Estate property is an online real-estate service committed to helping you make wise and profitable 
decisions related to buying, selling, renting and leasing of properties, in India and key global geographies. 
It will provide a fresh new approach to our esteemed users to search for properties to buy or rent, and 
list their properties for selling or leasing.

(Copy of the Vendor Homepage:  http://www.gharwhar.com)


Abstract:
=========
The Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in REAL Estate Property web application.


Report-Timeline:
================
2012-05-02: Public or Non-Public Disclosure


Status:
========
Published


Exploitation-Technique:
=======================
Remote


Severity:
=========
Critical


Details:
========
1.1
A remote SQL Injection vulnerability is detected on Real Estates property website cms 2012 Q2.
The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands 
on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise.

Vulnerable Module(s):
   [+] Project-Shree_Balaji_-Ahmedabad-4
   [+] property_listings_detail.php?listingid=12[
   [+] my_account_edit_builder_project.php?id=37%27
   [+] my_account_view_builder_project.php?id=37


--- SQL Exception Logs ---
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version 
for the right syntax to use near \\\\\\\'Approved\\\\\\\' AND proj_featured=\\\\\\\'yes\\\\\\\'\\\\\\\' at line 1
-
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version 
for the right syntax to use near  Approved  AND proj_featured= yes  at line 1
-
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version 
for the right syntax to use near  37  at line 1


Picture(s):
   ../1.png
   ../2.png
   ../3.png
   ../4.png
     
     
1.2
A persistent input validation vulnerabilities are detected Real Estates property website cms 2012 Q2.
The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent).
Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) 
context manipulation. Exploitation requires low user inter action.
                                       
Vulnerable Module(s):
   [+] Create Object - Project Name / Title/Short Description/Project TypeProject Location / Address/Contact Person/Address

     
1.3 Arbiritrary File Upload
Arbitrary file upload vulnerability allows the attacker to upload different files that aren\\\\\\\'t images or pdf. The attacker can upload these files after, he/she remans them to file.php.jpg. The null byte get truncated and the the file file.php get uploaded 

Vulnerable Module(s):
   [+] Property Details - uploading propertied photos
   [+] add profile photo


Risk:
=====
1.1
The security risk of the pre auth sql injection vulnerabilities are estimated as critical.

1.2
The security risk of the persistent input validation vulnerabilities are estimated as medium.

1.3
The security risk of the Arbitrary File upload bug is estimated as high(+).


Credits:
========
Vulnerability Laboratory [Research Team]  -    the_storm  (storm@vulnerability-lab.com)


Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab or its suppliers.

          Copyright © 2012 Vulnerability-Lab