SQL Injection Vulnerabilities in Mac's CMS

2010-06-10T00:00:00
ID HTB22436
Type htbridge
Reporter High-Tech Bridge
Modified 2010-06-10T00:00:00

Description

High-Tech Bridge SA Security Research Lab has discovered multiple vulnerabilities in Mac's CMS which could be exploited to perform SQL injection attacks.

1) SQL injection vulnerability in Mac's CMS
1.1 The vulnerability exists due to input sanitation errors in the “commentId” parameter in index.php. A remote attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in applications database. Successful exploitation may allow an attacker to read, modify, add or delete arbitrary data in the database. Exploitation example: http://host/index.php/main/cms/deleteComment/?commentId=4'-'1 1.2 The vulnerability exists due to input sanitation errors in the “lang” parameter in index.php. A remote attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in applications database. Successful exploitation may allow an attacker to read, modify, add or delete arbitrary data in the database. Successful exploitation requires privileges to delete comments.
Exploitation example:
http://host/index.php/home?lang=-1%27+union+select+1,2,3,4,5,6,7,8,9,10,11,1 2,13+--+