NeoInvoice Blind SQL Injection

2012.08.13
Credit: Adam Caudill
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

NeoInvoice is a multi-tenant open source invoicing system, that currently contains an unauthenticated blind SQL injection condition in signup_check.php. The input for the value field isn't being properly sanitized, and is used in string concatenation to create the SQL query. See here for the offending code: https://github.com/tlhunter/neoinvoice/blob/5e7af94641cba17df9141e95108c369cfb6e6dd5/public/signup_check.php#L29 Proof of concept: signup_check.php?field=username&value='+OR+SLEEP(5)+OR+' I've alerted the author but haven't heard back. More Info: http://adamcaudill.com/2012/08/12/neoinvoice-blind-sql-injection-cve-2012-3477/ Project: https://github.com/tlhunter/neoinvoice --Adam Caudill http://adamcaudill.com

References:

https://github.com/tlhunter/neoinvoice
http://adamcaudill.com
http://adamcaudill.com/2012/08/12/neoinvoice-blind-sql-injection-cve-2012-3477/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top