Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
WebWiz Products SQL Injection
2005.12.30
Credit:
devil_box
Risk:
Medium
Local:
No
Remote:
Yes
CVE:
CVE-2005-4606
CWE:
CWE-89
Ogólna skala CVSS:
7.5/10
Znaczenie:
6.4/10
Łatwość wykorzystania:
10/10
Wymagany dostęp:
Zdalny
Złożoność ataku:
Niska
Autoryzacja:
Nie wymagana
Wpływ na poufność:
Częściowy
Wpływ na integralność:
Częściowy
Wpływ na dostępność:
Częściowy
[KAPDA::#18] - WebWiz Products SQL Injection Happy new year ! :) KAPDA New advisory Vulnerable products : webwiz site news access2000 : vesion 3.06 and prior versions webwiz journal access2000 : version 1.0 webwiz weekly poll access2000 : version 3.06 and prior versions database login access2000 : version 1.71 and prior versions webwiz site news access97 : version 3.06 and prior versions webwiz journal access97 : version 1.0 webwiz weekly poll access97 : version 3.06 and prior versions database login access97 : version 1.71 and prior versions Vendor: http://www.webwizguide.info Risk: High Vulnerability: SQL_Injection Date : -------------------- Found : Aug 14 2005 Vendor Contacted : Dec 30 2005 Release Date : Dec 30 2005 About WebWiz Products : -------------------- Vendor`s description WebWiz site news : http://webwizguide.info/asp/sample_scripts/site_news_script.asp WebWiz journal : http://webwizguide.info/asp/sample_scripts/journal_application.asp WebWiz weekly poll : http://webwizguide.info/asp/sample_scripts/weekly_poll_script.asp WebWiz Password Login Page (Database Login) : http://webwizguide.info/asp/sample_scripts/database_login_script.asp Discussion : ---------------- Some input passed to "check_user.asp" when logging in isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Vulnerabilities: -------------------- SQL_Injection in "/[product]/check_user.asp" . At parameter named 'txtUserName', Attacker can enter SQL command to login to the system.(For all products) Proof of Concepts: -------------------- <html> <h1>WebWiz Scripts Login Bypass PoC - site news , journal , weekly poll - Kapda `s advisory </h1> <p> Discovery and exploit by devil_box [at} kapda.ir</p> <p><a href="http://www.kapda.ir/"> Kapda - Security Science Researchers Institute of Iran</a></p> <form method="POST" action="http://target/[product]/check_user.asp"> <input type="hidden" name="txtUserName" value="[SQL INJECTION]"> <input type="hidden" name="txtUserPass" value="1"> <input type="submit" value="Submit" name="submit"> </form></html> <html> <h1>WebWiz Login Bypass PoC - Database login - Kapda `s advisory </h1> <p> Discovery and exploit by devil_box [at} kapda.ir</p> <p><a href="http://www.kapda.ir/"> Kapda - Security Science Researchers Institute of Iran</a></p> <form method="POST" action="http://target/[product]/check_user.asp"> <input type="hidden" name="txtUserName" value="[SQL INJECTION]"> <input type="hidden" name="txtUserPass" value="1"> <input type="submit" value="Submit" name="submit"> </form></html> Solution: -------------------- No patch`s released yet by vendor. Original Advisory: -------------------- http://www.kapda.ir/advisory-167.html Credit : -------------------- DevilBox of KAPDA devil_box [at} kapda.ir Kapda - Security Science Researchers Insitute of Iran http://www.KAPDA.ir # SecurityReason thanks farhad
See this note in RAW Version
Tweet
Vote for this issue:
0
0
50%
50%
Thanks for you vote!
Thanks for you comment!
Your message is in quarantine 48 hours.
Comment it here.
Nick (*)
Email (*)
Video
Text (*)
(*) -
required fields.
Cancel
Submit
{{ x.nick }}
|
Date:
{{ x.ux * 1000 | date:'yyyy-MM-dd' }}
{{ x.ux * 1000 | date:'HH:mm' }}
CET+1
{{ x.comment }}
Show all comments
Copyright
2024
, cxsecurity.com
Back to Top