The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] HELM Management and Control System SQL Injection and XSS Vulnerabilities


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 3 Nov 2004 17:10:28 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [NT] HELM Management and Control System SQL Injection and XSS Vulnerabilities

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  HELM Management and Control System SQL Injection and XSS Vulnerabilities
------------------------------------------------------------------------


SUMMARY

" <http://helm.webhostautomation.com>; Helm is a multi-server management 
and control system for Windows 2000 and 2003 based web hosts. The system 
is designed for any size web hosting companies, datacenters and ISPs, 
which require a solid platform that automates all of the day-to-day tasks 
that would otherwise require highly skilled man power, and large work 
forces."

SQL injection and cross site scripting attacks are plausible in HELM due 
to lack of input validation in various fields of the "compose message" 
form.

DETAILS

Vulnerable Systems:
 * HELM version 3.1.19 and prior

Immune Systems:
 * HELM version 3.1.20

The HELM Messaging module is used by resellers to keep customers up to 
date with the latest information. System information messages can also be 
sent to the messaging service to inform resellers and users of any 
problems. Due to the lack of proper input validation in this module, it's 
possible both to inject SQL commands and malicious script to the system to 
gain "ADMIN" level access to the system.

SQL Injection
There is no input validation for the "messageToUserAccNum" parameter of 
the "compose message" form, facilitating execution of crafted SQL queries 
by passing arbitrary SQL code. By using a Man in The Middle HTTP tool, 
it's possible to inject SQL query in "messageToUserAccNum" value, in the 
form of:
        [username]',[messageid],[isread]);  [arbitrary sql query];--

For example, a user with reseller level access can send the following 
value that will add an account 'root' with ADMIN privilege and blank 
password to the account table in HELM database:
xxxx',10,0);  insert into 
account(accountnumber,accounttype,accountpassword) values('root',0,'');--

Cross Site Scripting
The malicious script code can be placed within the 'Subject' field of the 
'Compose Message' form. Since the code is unfiltered, viewing of the 
message by another user on the system will trigger the code.

Vendor Status:
The vendor has fixed the security issues and a newer version is available 
for download. Users are highly encouraged to upgrade to the latest 
version.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> 
Hat-Squad Security Team.
The original article can be found at:  
<http://www.hat-squad.com/en/000077.html>; 
http://www.hat-squad.com/en/000077.html




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру