WSCreator 1.1 Blind SQL Injection

2009-12-18 / 2009-12-19
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 6.8/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

WSCreator 1.1 Blind SQL Injection Name WSCreator Vendor http://www.wscreator.com Versions Affected 1.1 Author Salvatore Fresta aka Drosophila Website http://www.salvatorefresta.net Contact salvatorefresta [at] gmail [dot] com Date 2009-12-15 X. INDEX I. ABOUT THE APPLICATION II. DESCRIPTION III. ANALYSIS IV. SAMPLE CODE V. FIX I. ABOUT THE APPLICATION Based on one of the world's leading structure and content management systems - WebSiteAdmin, WSCreator (WS standing for WebSite) is powerful application for handling multiple websites. This is a commercial application. II. DESCRIPTION The email value is not properly sanitised when an INSERT query is used and this is the cause of the Blind SQL Injection. III. ANALYSIS Summary: A) Blind SQL Injection A) Blind SQL Injection Like I wrote previous, the email field is not properly san itised, infact if you try to insert an "'", you will obtain a SQL error message like the following: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''','127.0.0.1','1260844198','error','') The module affected is ADMIN/loginaction.php at line 2. As you can see, that is a INSERT SQL syntax. In order to exploit this vulnerability, the flag Magic Quotes GPG (php.ini) must be Off. IV. SAMPLE CODE username: ',(SELECT BENCHMARK(99999999, MD5(0x90))),'','','')# password: foo V. FIX No Fix.

Referencje:

http://xforce.iss.net/xforce/xfdb/54791
http://www.vupen.com/english/advisories/2009/3524
http://www.securityfocus.com/archive/1/archive/1/508471/100/0/threaded
http://www.exploit-db.com/exploits/10446
http://secunia.com/advisories/37753
http://osvdb.org/60987


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top