OpenDocMan 1.2.6.2 SQL Injection and Access Bypass

2012.12.14
Credit: Ken
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

#1 - Unprotected id parameter ----------------------------- In check-in.php the id variable is not filtered so that one can put in additional SQL statements. I have been able to get a UNION SELECT query to run but I do not think it's exploitable because there is a second query that runs with the id variable that will fail. None-the-less it is possible to get my string to the interpreter as valid SQL. #2 - Password reset allows anyone to reset the admin password ------------------------------------------------------------- forgot_password.php does not have any authentication or checking to make sure the user is only changing their password. So, an unauthenticated user can reset the password of any account if this functionality is enabled. It is disabled by default. #3 - ACL broken for restricted documents ---------------------------------------- Assume a user uploads a file and put restricted access control around it preventing any other users from accessing it through the software interface. If an attacker were to change the aku parameter to include the restricted file number they would be able to use the check-out.php page to retrieve the restricted file. Thanks to Stephen Laurence, the developer for this OSS project, for the quick replies. These issues were addressed by the developer (although I did not test the changes). Please download the latest version. Ken http://silverbackventuresllc.com

References:

http://silverbackventuresllc.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top