Lucene search

K
htbridgeHigh-Tech BridgeHTB23152
HistoryApr 10, 2013 - 12:00 a.m.

SQL Injection in b2evolution

2013-04-1000:00:00
High-Tech Bridge
www.htbridge.com
18

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

55.6%

High-Tech Bridge Security Research Lab discovered SQL injection vulnerability in b2evolution, which can be exploited to alter SQL requests passed to the vulnerable application’s database.

  1. SQL Injection in b2evolution: CVE-2013-2945
    The vulnerability exists due to insufficient validation of HTTP GET parameter “show_statuses” in “/blogs/admin.php” script. A remote authenticated administrator can execute arbitrary SQL commands in application’s database.
    Depending on database and system configuration, PoC code below will create a “/tmp/file.txt” file, containing MySQL version:
    http://[host]/blogs/admin.php?submit=Search&ctrl=items&tab=full&blog=1&show_ statuses[]=1’) )) UNION SELECT version() INTO OUTFILE ‘/tmp/file.txt’ –

This vulnerability is also exploitable via CSRF vector, since the application is prone to Cross-Site Request Forgery (CSRF) attacks. In order to do so an attacker should trick a logged-in administrator to visit malicious web page with CSRF exploit.
Basic CSRF exploit:
<img src=“http://[host]/blogs/admin.php?submit=Search&ctrl=items&tab=full&blog=1& show_statuses[]=1’) )) UNION SELECT version() INTO OUTFILE ‘/tmp/file.txt’ --”>

CPENameOperatorVersion
b2evolutionle4.1.6

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

55.6%