Dokeos 2.2 RC2 SQL Injection Vulnerability

2013-11-27T00:00:00
ID 1337DAY-ID-21579
Type zdt
Reporter High-Tech Bridge
Modified 2013-11-27T00:00:00

Description

Dokeos version 2.2 RC2 suffers from a remote SQL injection vulnerability.

                                        
                                            Vendor: Dokeos
Vulnerable Version(s): 2.2 RC2 and probably prior
Tested Version: 2.2 RC2
Advisory Publication:  October 30, 2013  [without technical details]
Vendor Notification: October 30, 2013 
Public Disclosure: November 27, 2013 
Vulnerability Type: SQL Injection [CWE-89]
CVE Reference: CVE-2013-6341
Risk Level: High 
CVSSv2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Solution Status: Solution Available
Discovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ ) 

-----------------------------------------------------------------------------------------------

Advisory Details:

High-Tech Bridge Security Research Lab discovered vulnerability in Dokeos, which can be exploited to perform SQL Injection attacks.


1) SQL Injection in Dokeos: CVE-2013-6341

The vulnerability exists due to insufficient validation of "language" HTTP GET parameter passed to "/index.php" script. A remote unauthenticated attacker can execute arbitrary SQL commands in application's database and gain complete control over the vulnerable web application.

The following exploitation example displays version of MySQL server:

http://[host]/index.php?language=0%27%20UNION%20SELECT%201,2,3,4,version%28%29,6,7,8%20--%202

-----------------------------------------------------------------------------------------------

Solution:

Vendor did not reply to 6 notifications by email, 1 notification via twitter, 2 forum threads/direct messages. Currently we are not aware of any official solution for this vulnerability.

Unofficial patch was developed by High-Tech Bridge Security Research Lab and is available here: https://www.htbridge.com/advisory/HTB23181-patch.zip

#  0day.today [2018-01-05]  #