The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


IRM Security Advisory : RedDot CMS SQL injection vulnerability


<< Previous INDEX Search src / Print Next >>
Subject: IRM Security Advisory : RedDot CMS SQL injection vulnerability 
Date: Mon, 21 Apr 2008 17:10:10 +0100
Message-ID: <7B01ACCEDD4FFE48B12A55E2DB16A9304CA8E4@dccheltenham.local.irmplc.com.>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: IRM Security Advisory : RedDot CMS SQL injection vulnerability 
Thread-Index: AcijyZio8YkqOv9VQ9CBw7JVMljkAAAAH1hg
From: "Mark Crowther" <mark.crowther@irmplc.com.>
To: <bugtraq@securityfocus.com.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

RedDot CMS SQL injection vulnerability (CVE Number: CVE-2008-1613)

http://www.irmplc.com/index.php/167-Advisory-026


Vulnerability Type/Importance: SQL injection/Critical

Problem Discovered: =A0=A0=A0 12 February 2008
Vendor Contacted: =A0=A0=A0=A0=A0 19 February 2008
Advisory Published: =A0=A0=A0 21 April 2008


Abstract:
The RedDot CMS Product (http://www.reddot.com) is vulnerable to a =
pre-authentication SQL injection vulnerability which, when exploited, =
allows enumeration of all SQL database content.

Description:
The 'LngId' Parameter passed to IoRD.asp is responsible for assigning =
the language context for the CMS application. The vulnerability exists =
as a result of inadequate validation of user-supplied input within this =
parameter.


Technical Details:
Normal input for the 'LngId' parameter contains a code such as ENG, DEU, =
JP, denoting the language type. This parameter is not properly validated =
and the injection of SQL statements within it allows attackers =
unrestricted access to enumerate information from the database. For =
example:

https://vulnerablehost.com:443/cms/ioRD.asp?Action=3DShowMessage&LngId=3D=
ENG.DGC0 FROM IO_DGC_ENG UNION SELECT min(name) FROM SYSOBJECTS where =
xtype=3Dchar(85) and name> '' ORDER BY 1;-- &DisableAutoLogin=3D1

Proof of Concept:
A Proof of Concept (RDdbenum.py) has been developed to automate =
enumeration of entire database content available from =
http://www.irmplc.com/Tools/RDdbenum.py


Workaround / Solutions:
There are no known workarounds for this vulnerability
The Vendor has released a patch for this vulnerability, Release =
7.5.1.86, available from normal Red Dot customer support contacts.


Tested / Affected Versions:
IRM confirmed the presence of this vulnerability in RedDot CMS version =
7.5 Build 7.5.0.48, tested with Microsoft SQL Server 2005 database.
It is believed that this issue exists in RedDot CMS versions 6.5 and =
7.0; however this has not been fully verified.


Credits:
Research and Advisory: Mark Crowther and Rodrigo Marcos


Disclaimer:
All information in this advisory is provided on an 'as is' basis in the =
hope that it will be useful. Information Risk Management Plc is not =
responsible for any risks or occurrences caused by the application of =
this information.




<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру