SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Ocean12 Mailing List Manager Vendors:   Ocean12 Technologies
Ocean12 Mailing List Manager Lets Remote Users Inject SQL Commands
SecurityTracker Alert ID:  1013833
SecurityTracker URL:  http://securitytracker.com/id/1013833
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 28 2005
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Exploit Included:  Yes  
Version(s): 1.06
Description:   Zinho from Hackers Center Security Group reported an input validation vulnerability in Ocean12 Mailing List Manager. A remote user can inject SQL commands.

The admin login panel does not properly validate user-supplied input in the the 'Admin_id' and 'Admin_password' fields. A remote user can supply specially crafted values to execute SQL commands on the underlying database and gain administrative access on the application.

A demonstration exploit value is provided:

Admin_id: Admin' UNION ALL SELECT
id,id,id,id,id,id,id,id,id,id,id,id,id,id FROM settings WHERE
Admin_id='Admin
Admin_Password: 1

The vendor has been notified.

Impact:   A remote can execute SQL commands on the underlying database. This can be exploited to gain administrative access on the application.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.ocean12scripts.com/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [HSC Security Group] Ocean12 Mailing List Manager Pro SQL injection


Hackers Center Security Group (http://www.hackerscenter.com/)        
Zinho's Security Advisory         

Desc: SQL injection : Ocean12 Mailing list manager PRO 1.06
Vendor: www.ocean12scripts.com
Risk: High 


An sql injection allows anyone to login as admin using this sql query in 
the login panel:

Admin_id: Admin' UNION ALL SELECT  
id,id,id,id,id,id,id,id,id,id,id,id,id,id FROM settings WHERE 
Admin_id='Admin
Admin_Password: 1

Of course this is a serious flaw that can lead to mail bombing anyone 
subscribed to the mailing list and taking full control over the list.


Vendor has been contacted several weeks ago. Noone replied.


Author:         
Zinho is webmaster and founder of http://www.hackerscenter.com ,      
Security research   portal       
Secure Web Hosting Companies Reviewed:      
http://www.securityforge.com/web-hosting/secure-web-hosting.asp      

zinho-no-spam @ hackerscenter.com     


====>
Webmaster of
.:[ Hackers Center : Internet Security Portal]:.
http://www.hackerscenter.com
http://www.securityforge.com/web-hosting
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC