ID E-69
Type dsquare
Reporter Dsquare Security
Modified 2013-04-02T00:00:00
Description
Blind SQLi (add_ons.php)
Vulnerability Type: SQL Injection
For the exploit source code contact DSquare Security sales team.
{"id": "E-69", "type": "dsquare", "bulletinFamily": "exploit", "title": "Jaow SQLi", "description": "Blind SQLi (add_ons.php)\n\nVulnerability Type: SQL Injection", "published": "2012-07-01T00:00:00", "modified": "2013-04-02T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "", "reporter": "Dsquare Security", "references": ["https://vulners.com/BID/BID:53677", "https://vulners.com/OSVDB/OSVDB:82231"], "cvelist": ["CVE-2012-2952"], "lastseen": "2019-05-29T15:31:56", "viewCount": 7, "enchantments": {"score": {"value": 7.0, "vector": "NONE", "modified": "2019-05-29T15:31:56", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-2952"]}, {"type": "exploitdb", "idList": ["EDB-ID:18921"]}], "modified": "2019-05-29T15:31:56", "rev": 2}, "vulnersScore": 7.0}, "sourceData": "For the exploit source code contact DSquare Security sales team."}
{"cve": [{"lastseen": "2020-12-09T19:47:20", "description": "SQL injection vulnerability in add_ons.php in Jaow 2.4.5 and earlier allows remote attackers to execute arbitrary SQL commands via the add_ons parameter.", "edition": 5, "cvss3": {}, "published": "2012-05-29T20:55:00", "title": "CVE-2012-2952", "type": "cve", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-2952"], "modified": "2017-08-29T01:31:00", "cpe": ["cpe:/a:jaow:jaow:2.4", "cpe:/a:jaow:jaow:2.3", "cpe:/a:jaow:jaow:2.4.5", "cpe:/a:jaow:jaow:2.1"], "id": "CVE-2012-2952", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2952", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:jaow:jaow:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:jaow:jaow:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:jaow:jaow:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:jaow:jaow:2.1:*:*:*:*:*:*:*"]}], "exploitdb": [{"lastseen": "2016-02-02T10:43:07", "description": "Jaow <= 2.4.5 - Blind SQL Injection. CVE-2012-2952. Webapps exploit for php platform", "published": "2012-05-24T00:00:00", "type": "exploitdb", "title": "Jaow <= 2.4.5 - Blind SQL Injection", "bulletinFamily": "exploit", "cvelist": ["CVE-2012-2952"], "modified": "2012-05-24T00:00:00", "id": "EDB-ID:18921", "href": "https://www.exploit-db.com/exploits/18921/", "sourceData": "# Exploit Title: Jaow <= 2.4.5 Blind Sql Injection\r\n# Google Dork: intext:\"propuls\ufffd par jaow 2.4.5\"\r\n# Date: 23/05/2012\r\n# Software Link: http://www.jaow.net/telechargements/Jaow_V2.4.5.zip\r\n# Version: 2.4.5\r\n# Tested on: Debian GNU/Linux\r\n# Author: kallimero\r\n\r\n\r\n= Introduction =\r\n\r\n\r\nJaow is a CMS that can manage sites of small sizes, thanks to its simple,\r\ncommented code you can easily create templates and / or create modules to\r\nsuit your needs. Jaow is the solution for small sites, blogs or portfolio.\r\n\r\n= Details =\r\n\r\nUnfortunately, a Blind SQL injection is possible in the 2.4.5 core.\r\n\r\nVulnerable page : add_ons.php\r\nExtract from the source :\r\n\r\n-------------[ add_ons.php ]--------------\r\n // On stocke dans une variable simple le add_on demand\ufffd\r\n $add_on = stripslashes($_GET['add_ons']);\r\n\r\n // On recherche si l'add_on est install\ufffd\r\n\r\n echo 'SELECT id,nom FROM '.$db_prefix.'add_ons WHERE nom=\"'.$add_on.'\"\r\nAND actif=\"1\"';\r\n\r\n $query_add_ons = mysql_query('SELECT id,nom FROM '.$db_prefix.'add_ons\r\nWHERE nom=\"'.$add_on.'\" AND actif=\"1\"');\r\n\r\n-------------[ add_ons.php ]--------------\r\n\r\nSo, we can inject sql with the add_ons variable, like that :\r\nhttp://[site]/[path]/add_ons.php?add_ons=[SQL injection]\r\n\r\n\r\n= Solutions =\r\n\r\nUpdate is avalaible here : http://www.jaow.net/Article-97\r\n\r\n\r\n= Thanks =\r\n\r\nThanks to necromoine, fr0g, st0rn, applestorm, Zhyar, k3nz0, m4ke and all\r\nhwc-crew members. http://hwc-crew.com/\r\nAnd all npn members. http://n-pn.info/\r\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/18921/"}]}