Jump to content

Security Test


BillyBoB

Recommended Posts

Admin Access:

I got your username and password with a cookie stealer.

 

Array:

http://www.dreamshowstudios.net/programs.php?id[]

 

Array:

http://dreamshowstudios.net/viewpic.php?full[]

 

Cross Site Scripting:

http://dreamshowstudios.net/pm.php?dignore=<marquee><h1>vulnerable</marquee>

 

Cross Site Scripting:

http://www.dreamshowstudios.net/programs.php?id=<marquee><h1>vulnerable</marquee>

 

Cross Site Scripting:

http://www.dreamshowstudios.net/viewpic.php?pic="><marquee><h1>vulnerable</marquee>

 

Cross Site Scripting:

There is Cross Site Scripting if you send a message that contains code.

 

Cross Site Scripting:

There is Cross Site Scripting in the Shoutbox.

 

Cross Site Scripting:

There is Cross Site Scripting when you register if the fields contain code.

 

Directory Transversal:

http://www.dreamshowstudios.net/viewpic.php?pic=../Images/splash

 

Drop Down Menu:

If you edit the drop down menu on http://www.dreamshowstudios.net/viewpic.php you can submit arbitrary values.

 

Full Path Disclosure:

http://www.dreamshowstudios.net/forums/index.php?action[]

Notice: Array to string conversion in /home/dreamsh/public_html/forums/Sources/QueryString.php on line 245

 

Notice: Array to string conversion in /home/dreamsh/public_html/forums/Sources/QueryString.php on line 247

 

Full Path Disclosure:

http://www.dreamshowstudios.net/forums/index.php?board[]

Notice: Array to string conversion in /home/dreamsh/public_html/forums/Sources/QueryString.php on line 198

 

Full Path Disclosure:

http://www.dreamshowstudios.net/members.php?&pg=-1

Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /home/dreamsh/public_html/members.php on line 116

 

Full Path Disclosure:

http://www.dreamshowstudios.net/members.php?&pg[]

Fatal error: Unsupported operand types in /home/dreamsh/public_html/members.php on line 108

 

Full Path Disclosure:

http://www.dreamshowstudios.net/pm.php?pto=Tester

Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /home/dreamsh/public_html/pm.php on line 290

 

Full Path Disclosure:

There is Full Path Disclosure in the Shoutbox.

Fatal error: Cannot redeclare pagination() (previously declared in /home/dreamsh/public_html/functions.php:2) in /home/dreamsh/public_html/functions.php on line 2

 

Full Path Disclosure:

There is Full Path Disclosure when you register.

Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /home/dreamsh/public_html/register.php on line 117

 

Includes Directory:

http://www.dreamshowstudios.net/h2/

 

Insecure Cookie:

You shouldn't put the password in the cookie.

 

Insecure Cookie:

You shouldn't put the username in the cookie.

 

Maximum Length:

If you edit the input boxes in your profile you can remove the maximum lengths.

 

PHP Source Code Disclosure:

http://www.dreamshowstudios.net/backup/

 

PHP Source Code Disclosure:

You have added deletexss('A Distraction04') to your ignorelist

 

SQL Injection:

http://www.dreamshowstudios.net/pm.php?func=del&mid=52 AND 1=1

http://www.dreamshowstudios.net/pm.php?func=del&mid=52 AND 1=2

 

SQL Injection:

http://www.dreamshowstudios.net/pm.php?pto=Tester&mid=48 AND 1=1

http://www.dreamshowstudios.net/pm.php?pto=Tester&mid=48 AND 1=2

 

SQL Injection:

http://www.dreamshowstudios.net/programs.php?id=3 AND 1=1

http://www.dreamshowstudios.net/programs.php?id=3 AND 1=2

Link to comment
Share on other sites

your registeration system is BUGGED...

it gave me email failed (or some error like that)

 

yet the user still appears in the userlist, same thing with <script>alert("xss");</script>

 

so limit the username length with php (server side) not something client side (htmL)

Link to comment
Share on other sites

Well using something like:

 

$usern=stripslashes($usern);

$usern=strip_tags($usern);

$usern=mysql_real_escape_string($usern);

 

etc (make it a function if you use it a lot)

 

will filter the input and make it hard to xss/sql inject... Making an array and using str_replace($arrayvariable, " ", "$whattofilter")

and also help if you dont want a couple different characters/words allowed (but can by bypassed)

 

EDIT: goodnight.

Link to comment
Share on other sites

wait a sec...... WHY the heck are you md5ing passwords and setting them to a cookie?

 

that's dangerous... cookie stealer could have been made and stolen your cookie, then I would have cracked it and had your password.

Link to comment
Share on other sites

btw: I just tried to register the username Tester and p/w password and it said it worked...

 

(Yeah I know you not to, but I couldn't resist.)

 

 

 

roflmao now no one can login with tester cause I need to validate the account (but the email I used to reg was "password") xD

 

Link to comment
Share on other sites

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.