Walla TeleSite ts.exe sug Variable SQL Injection

2005-11-14T09:47:28
ID OSVDB:20883
Type osvdb
Reporter Rafi Nahum(rafiware@bezeqint.net)
Modified 2005-11-14T09:47:28

Description

Vulnerability Description

Walla TeleSite contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the ts.exe (also know as ts.cgi) script not properly sanitizing user-supplied input to the 'sug' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Walla TeleSite contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the ts.exe (also know as ts.cgi) script not properly sanitizing user-supplied input to the 'sug' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/ts.exe?tsurl=0.52.0.0&tsstmplt=search_tour&sug=%EF'%20or%201=1%2 0union%20all%20select%20top%201%20null,null,null,null,null,null,null,null,nu ll,'nuli','zulu','papa','qqq','rar','ewe',table_name,'asd','ttt','werwr','ry y','poo','polo','nike'%20from%20information_schema.columns--

References:

Vendor URL: http://www.walla.co.il Security Tracker: 1015204 Secunia Advisory ID:17547 Related OSVDB ID: 20885 Related OSVDB ID: 20881 Related OSVDB ID: 20884 Related OSVDB ID: 20882 Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0413.html CVE-2005-3578 Bugtraq ID: 15419