SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   JGS-Portal Vendors:   jgs-xa.de
JGS-Portal 'id' Parameter Input Validation Hole Lets Remote Users Inject SQL Commands
SecurityTracker Alert ID:  1013866
SecurityTracker URL:  http://securitytracker.com/id/1013866
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  May 3 2005
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Exploit Included:  Yes  
Version(s): 3.0.1
Description:   An input validation vulnerability was reported in JGS-Portal. A remote user can inject SQL commands.

The 'jgs_portal.php' script does not properly validate user-supplied input in the 'id' parameter. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

A demonstration exploit URL is provided:

http://[target]/jgs_portal.php?id='SQL_here

[R] discovered this vulnerability.

Impact:   A remote user can execute SQL commands on the underlying database.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.jgs-xa.de/board.php?boardid=60 (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  JGS-Portal 3.0.1 SQL-Injection




#######################################
#                                     #
# Woltlab Burning Board - Portal Hack #
# JGS-Portal 3.0.1 SQL-Injection      #
#                                     #
#######################################

--------------------------------
Version: <= JGS-Portal Ver 3.0.1
Type:    SQL-Injection
--------------------------------

Discovered by [R].



Informations:
-----------------------
JGS-Portal is a portal hack for the Woltlab Burning Board.




Bug:
-----------------------
If we apply wrong code in the ID variable we get an error similar to this:

++
SQL-DATABASE ERROR
Database error in WoltLab Burning Board (2.3.x): Invalid SQL: xxx
mysql error: You have an error in your SQL syntax...
mysql error number: 1064
mysql version: 4.x.x_Debian-2-log
php version: 4.x.x-x
Date: xx.0x.2005 @ 10:xx
Script: /jgs_portal.php?id='a
Referer:
++


Exploit:
-----------------------
It's possible to exploit this vulnerability, but it's very hard ;)

www.batznet.com/jgs_portal.php?id='SQL_here


Patch:
-----------------------
No Patch available.



Greetz fly out to EaTh, MadInfect, darkkilla, redice, kr3mliyn


// www.batznet.com

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC