Document Title: =============== WebMartIndia CMS 2016 Q1 - SQL Injection Vulnerability References (Source): ==================== http://ift.tt/1NxhUPJ Release Date: ============= 2016-01-26 Vulnerability Laboratory ID (VL-ID): ==================================== 1681 Common Vulnerability Scoring System: ==================================== 7.4 Product & Service Introduction: =============================== WebMartIndia is a uniquely competent, professional and creative website designing & internet marketing company providing full featured internet marketing solutions and web services including B2B & B2C e-commerce solutions which also acts as an offshore development centre for overseas development firms to help them optimize their business significance in the global market. (Copy of the Vendor Homepage: http://ift.tt/1QCSFC3 ) Abstract Advisory Information: ============================== An independent vulnerability laboratory research group discovered a sql injection web vulnerability in the official WebMartIndia Content Management System (2016-Q1). Vulnerability Disclosure Timeline: ================================== 2016-01-26: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== WebMartIndia Product: Content Management System 2016 Q1 Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ A remote sql injection web vulnerability has been discovered in the official los818 Content Management System (2016-Q1). The vulnerability allows remote attackers to execute own sql commands to compromise the web-applicaation or connected dbms. The sql injection web vulnerability is located in the id value of the products-new.php, products-desc.php, products-asc.php & products.php files. The request method to inject is GET and the attack vector of the issue is located on the application-side. Remote attackers are able to inject own sql commands to compromise the web-application or connected database management system. The security risk of the sql injection vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 7.6. Exploitation of the remote sql injection web vulnerability requires no user interaction or privileged web-application user account. Successful exploitation of the remote sql injection results in database management system, web-server and web-application compromise. Request Method(s): [+] GET Vulnerable File(s): [+] products.php (products-new.php, products-desc.php, products-asc.php & products.php) Vulnerable Parameter(s): [+] id [+] sid Proof of Concept (PoC): ======================= The remote sql injection web vulnerability can be exploited by remote attackers without privileged web-application user account or user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Dork(s): intext:Powered By WebMartIndia inurl:product.php?id= PoC: Example /product.php?id=[SQLi] PoC: http://ift.tt/1KFbXjC'[SQL INJECTION VULNERABILITY!
Source: Gmail -> IFTTT-> Blogger
No comments:
Post a Comment