Title: ====== Real Estates Property CMS 2012 - Multiple Web Vulnerabilities Date: ===== 2012-05-02 References: =========== http://www.vulnerability-lab.com/get_content.php?id=500 VL-ID: ===== 500 Introduction: ============= Real Estate property is an online real-estate service committed to helping you make wise and profitable decisions related to buying, selling, renting and leasing of properties, in India and key global geographies. It will provide a fresh new approach to our esteemed users to search for properties to buy or rent, and list their properties for selling or leasing. (Copy of the Vendor Homepage: http://www.gharwhar.com) Abstract: ========= The Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in REAL Estate Property web application. Report-Timeline: ================ 2012-05-02: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= Critical Details: ======== 1.1 A remote SQL Injection vulnerability is detected on Real Estates property website cms 2012 Q2. The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise. Vulnerable Module(s): [+] Project-Shree_Balaji_-Ahmedabad-4 [+] property_listings_detail.php?listingid=12[ [+] my_account_edit_builder_project.php?id=37%27 [+] my_account_view_builder_project.php?id=37 --- SQL Exception Logs --- You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near \\\\\\\'Approved\\\\\\\' AND proj_featured=\\\\\\\'yes\\\\\\\'\\\\\\\' at line 1 - You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near Approved AND proj_featured= yes at line 1 - You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 37 at line 1 Picture(s): ../1.png ../2.png ../3.png ../4.png 1.2 A persistent input validation vulnerabilities are detected Real Estates property website cms 2012 Q2. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. Vulnerable Module(s): [+] Create Object - Project Name / Title/Short Description/Project TypeProject Location / Address/Contact Person/Address 1.3 Arbiritrary File Upload Arbitrary file upload vulnerability allows the attacker to upload different files that aren\\\\\\\'t images or pdf. The attacker can upload these files after, he/she remans them to file.php.jpg. The null byte get truncated and the the file file.php get uploaded Vulnerable Module(s): [+] Property Details - uploading propertied photos [+] add profile photo Risk: ===== 1.1 The security risk of the pre auth sql injection vulnerabilities are estimated as critical. 1.2 The security risk of the persistent input validation vulnerabilities are estimated as medium. 1.3 The security risk of the Arbitrary File upload bug is estimated as high(+). Credits: ======== Vulnerability Laboratory [Research Team] - the_storm (storm@vulnerability-lab.com) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright © 2012 Vulnerability-Lab
Tuesday, 1 May 2012
Real Estates Property CMS 2012 - Multiple Web Vulnerabilities
Labels:
Vulnerabilities
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment