Bart's CMS SQL Injection

2012-01-23T00:00:00
ID PACKETSTORM:108974
Type packetstorm
Reporter snup
Modified 2012-01-23T00:00:00

Description

                                        
                                            `Title:  
======  
Bart`s CMS - SQL Injection Vulnerability  
  
  
Date:  
=====  
2012-01-23  
  
  
References:  
===========  
http://www.vulnerability-lab.com/get_content.php?id=390  
  
  
VL-ID:  
=====  
390  
  
  
Introduction:  
=============  
It is a website Content Management System that is build with Codecharge Studio. There will also be a   
commercial package, which contains all source code AND the Codecharge Studio project files.  
More information on Codecharge Studio can be found on the website of Yessoftware.  
  
Currently the CMS includes the following modules:  
  
Default / CMS   
Users  
Website pages  
Blocks  
Banners   
Links  
Image gallery  
Store / Webshop  
Diagrams  
Download manager  
IP To Country   
Mailing  
Polls  
Calendar / Events  
Blog / News  
Guestbook  
JW Flash Image Rotator  
  
(Copy of the Vendor Website: http://www.yessoftware.com/index2.php )  
(Copy: http://trinityhome.org/Home/index.php?content=BART_S_CMS_WHAT_IS_IT&front_id=21&lang=en&locale=en)  
  
  
Abstract:  
=========  
A Vulnerability Laboratory researcher discovered a critical (remote) SQL Injection Vulnerability on Bart`s CMS.  
  
  
  
Report-Timeline:  
================  
2012-01-23: Public or Non-Public Disclosure  
  
  
Status:  
========  
Published  
  
  
Exploitation-Technique:  
=======================  
Remote  
  
  
Severity:  
=========  
High  
  
  
Details:  
========  
A remote SQL Injection Vulnerability has been discovered on the Bart`s CMS application.  
The vulnerability allows an attacker to execute own sql commands via injection. The bug is  
located on the following files blog.php & blog_comments.php. Successful exploitation can   
result in cms dbms comprimise via remote sql injection.  
  
Vulnerable Module(s):  
[+] blog.php  
[+] blog_comments.php  
  
  
Proof of Concept:  
=================  
The vulnerability can be exploited by remote attacker without user inter action.  
For demonstration or reproduce ...  
  
PoC:  
[SERVER].COM/[BART CMS PATH]/blog_comments.php?blog_id=`[SQL-Injection]  
  
  
Risk:  
=====  
The security risk of the remote sql injection vulnerability is estimated as high(+).  
  
  
Credits:  
========  
Vulnerability Laboratory Researcher - snup (snup.php@gmail.com)  
  
= Gr33tz: =  
= agilob, cOnd, czoik, drummachina, gocys, prick  
= im2ee, MadCow, n1k0n3r, R3w, rtgn, SiD, vizzdoom   
= antonius, Rem0ve, longrifle0x  
  
  
Disclaimer:  
===========  
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,   
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-  
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business   
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some   
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation   
may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability-  
Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of   
other media, are reserved by Vulnerability-Lab or its suppliers.  
  
Copyright © 2012|Vulnerability-Lab  
  
--   
Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com  
Contact: admin@vulnerability-lab.com or support@vulnerability-lab.com  
  
`