what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

TA-150104.txt

TA-150104.txt
Posted Jan 16, 2004
Authored by posidron, rushjo | Site tripbit.org

Xtreme ASP Photo Gallery Version 2.0 is prone to a common SQL injection vulnerability. The problem occurs when handling user-supplied username and password data supplied to authentication procedures.

tags | exploit, sql injection, asp
SHA-256 | 18196c49e782ab6139923566eb59889974ae0a3c962a2c04583975e95eea74fa

TA-150104.txt

Change Mirror Download


Tripbit Security
Research
tripbit.org

Security Advisory


Advisory ID: TA-150104
Release Date: January
15th, 2004
Application: Xtreme ASP
Photo Gallery 2.0
Severity: Medium/High
Impact: Admin access
Class: Input
Validation Error
Vendor: http://
www.pensacolawebdesigns.com/



Overview
--------------------------------------------------------------------------------------

XTREME ASP Photo Gallery is a photo gallery that
allows easy photo management and complete
administration via a web based interface. This
interface offers many more features than conventional
web based photo gallery's do. With XTREME ASP Photo
Gallery, you can configure everything including
colors, text styles, amount of imaged displayed per
page and much more.



Details
--------------------------------------------------------------------------------------

Xtreme ASP Photo Gallery Version 2.0 is prone to a
common SQL injection vulnerability. The problem
occurs when handling user-supplied username and
password data supplied to authentication procedures.

http://[host]/photoalbum/admin/adminlogin.asp

If we type:

Username: 'or'
Password: 'or'

we gain admin access about the password protected
administrative pages.



Recommendation
--------------------------------------------------------------------------------------

No solution for the moment.



Vendor Response
--------------------------------------------------------------------------------------

The vendor has reportedly been notified to this
report.



Disclaimer
--------------------------------------------------------------------------------------

The information within this paper may change without
notice. Use of this information
constitutes acceptance for use in an AS IS condition.
There are NO warranties with
regard to this information. In no event shall the
author be liable for any damages
whatsoever arising out of or in connection with the
use or spread of this information.
Any use of this information is at the user's own
risk.



Additional information
--------------------------------------------------------------------------------------

These vulnerability have been found and researched
by:

posidron posidron@tripbit.org
rushjo rushjo@tripbit.org

You can find the last version of this warning in:

http://www.tripbit.org/advisories/TA-150104.txt

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close