[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] IAEA Website Service - Blind SQL Injection
From:       "research () vulnerability-lab ! com" <research () vulnerability-lab ! com>
Date:       2011-09-26 3:22:39
Message-ID: 4E7FEFFF.5090303 () vulnerability-lab ! com
[Download RAW message or body]

Title:
======
International Atomic Energy Agency - Blind SQL Injection Vulnerability


Date:
=====
2011-09-26



VL-ID:
=====
268

Reference:
==========
http://www.vulnerability-lab.com/get_content.php?id=268


Introduction:
=============
The IAEA was created in 1957 in response to the deep fears and expectations resulting from the \
discovery of nuclear energy. Its  fortunes are uniquely geared to this controversial technology \
that can be used either as a weapon or as a practical and useful tool. The Agency s genesis was \
US President Eisenhower s Atoms for Peace address to the General Assembly of the United Nations \
on 8  December 1953. These ideas helped to shape the IAEA Statute, which 81 nations unanimously \
approved in October 1956. The Statute  outlines the three pillars of the Agency s work - \
nuclear verification and security, safety and technology transfer.

(Copy of the Vendor Homepage: http://en.wikipedia.org )


Abstract:
=========
An anonymous Vulnerability Laboratory researcher discovered a blind SQL Injection vulnerability \
on the official International Atomic Energy Agency vendor website.


Report-Timeline:
================
2011-09-06:	Vendor Notification
2011-09-23:	Vendor Response/Feedback
2011-09-24:	Vendor Fix/Patch
2011-09-26:	Public or Non-Public Disclosure


Status:
========
Published


Affected Products:
==================
IAEA Website Service - 2011/Q3


Exploitation-Technique:
=======================
Remote


Severity:
=========
Critical


Details:
========
A SQL Injection Vulnerability is detected on the IAEA vendor website. An unsecure application \
parameter request allows  remote attackers to implement/execute own sql statements via \
sql-injection. Successful exploitation of the blind injection may  result in dbms compromise, \
defacement or manipulation of service/application content.

Vulnerable Module(s):
								[+] /nael/page.php

Vulnerable Para(s):		
								[+] recordID=


Picture(s):
								../sql_1.png


Risk:
=====
The security risk of the blind sql injection vulnerability is estimated as critical.


Credits:
========
Vulnerability Research Laboratory - Mohammed A.A (********)


Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. \
Vulnerability-Lab disclaims all warranties,  either expressed or implied, including the \
warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or \
its suppliers are not liable in any case of damage, including direct, indirect, incidental, \
consequential loss of business  profits or special damages, even if Vulnerability-Lab or its \
suppliers have been advised of the possibility of such damages. Some  states do not allow the \
exclusion or limitation of liability for consequential or incidental damages so the foregoing \
limitation  may not apply. Any modified copy or reproduction, including partially usages, of \
this file requires authorization from Vulnerability- Lab. Permission to electronically \
redistribute this alert in its unmodified form is granted. All other rights, including the use \
of  other media, are reserved by Vulnerability-Lab or its suppliers.

    						Copyright © 2011|Vulnerability-Lab




-- 
Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com
Contact: admin@vulnerability-lab.com or support@vulnerability-lab.com


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic