[<prev] [next>] [day] [month] [year] [list]
Message-ID: <001f01cfe726$59d09890$0d71c9b0$@oststrom.com>
Date: Mon, 13 Oct 2014 22:43:16 +0200
From: "oststrom \(public\)" <pub@...strom.com>
To: <fulldisclosure@...lists.org>
Subject: [FD] CVE-2014-2023 - Tapatalk for vBulletin 4.x - multiple blind
	sql injection (pre-auth)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 
*Preliminary VulnNote*
 
CVE-2014-2023 - Tapatalk for vbulletin 4.x - multiple blind sql injection
(pre-auth)
============================================================================
========
 
Overview
- --------
 
    date    :  10/12/2014   
    cvss    :  7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N) base  
    cwe     :  89   
    
    vendor  :  Tapatalk Inc  
    product :  Tapatalk for vBulletin 4.x   
    versions affected:    latest (to date)
                        5.2.1    (verified)
                        4.9.0     (verified)
                        
    exploitability :
                * remotely exploitable
                * NO authentication required
                * NO user interaction required
                * NO special configuration required (default settings)
                
Abstract
- ---------
    Tapatalk for vBulletin 4.x does not properly sanitize some xmlrpc calls 
    allowing unauthenticated users to inject arbitrary SQL commands.
    
    risk: high
    
    !! Note !! - this is a preliminary VulnNote. The full PoC / Description
will
    be made available within the next 7 days (see contact) to allow mobiquo
to 
    fix this.
    
    googledork: see PoC code
 
 
Details
- --------
    
    vulnerable component: 
        * stripped // see full VulnNote - (contact)
    xmlrpc request is decoded, decoded attacker provided values are directly
    being used in sql query.
 
 
Proof of Concept (PoC)
- ----------------------
 
    see https://github.com/tintinweb/pub/cve-2013-2023
    
    
    1) prerequesites
         vBulletin 4.x with Tapatalk for vBulletin 4.x installed
    2) run PoC
         edit PoC to match your TARGET (, optionally DEBUG=True)
         (optionally) edit your query to extract specific database values
         Note: PoC will try to detect tapatalk on that host
         run PoC
        
    by default extracts
    * mysql root hash (in case vBulletin db user has permissions to do so)
    * vbulletin db record fields (apikey) - perfectly chains with
CVE-2014-2023
    
    only limited by the vBulletin db_user access permissions
    
    
Timeline
- --------
 
    2014-01-14: initial vendor contact, no response
    2014-02-24: vendor contact, no response
    2014-10-13: public disclosure
    
Contact
- --------
    tintinweb - https://github.com/tintinweb/pub/cve-2013-2023
    
    
(0x721427D8)
    
    
-----BEGIN PGP SIGNATURE-----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=Zjgy
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists
 
