Summary
This host is installed with WeBid and is prone to multiple cross site scripting and LDAP injection vVulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
No solution or patch is available as of 20th February, 2015. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://www.webidsupport.com
Insight
Mulltiple flaws are due to,
- The /WeBid/user_login.php script does not validate input to the 'username' POST parameter before returning it to users.
- The register.php script does not validate input to the 'TPL_name', 'TPL_nick', ' TPL_email', 'TPL_year', 'TPL_address', 'TPL_city', 'TPL_prov', 'TPL_zip', 'TPL_phone', 'TPL_pp_email', 'TPL_authnet_id', 'TPL_authnet_pass', 'TPL_wordpay_id', 'TPL_toocheckout_id', and 'TPL_moneybookers_email' POST parameters before returning it to users.
- An input passed via the 'js' parameter is not properly sanitized upon submission to the loader.php script.
Affected
WeBid Version 1.1.1
Detection
Send a crafted data via HTTP POST request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVE CVE-2014-5101, CVE-2014-5114 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities