what you don't know can hurt you

OpenDocMan 1.2.6.2 SQL Injection / Access Bypass

OpenDocMan 1.2.6.2 SQL Injection / Access Bypass
Posted Dec 13, 2012
Authored by Kenneth F. Belva

OpenDocMan version 1.2.6.2 suffers from remote SQL injection and multiple access bypass vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, bypass
MD5 | f1085c129f4e3a974656389cb2cdc63c

OpenDocMan 1.2.6.2 SQL Injection / Access Bypass

Change Mirror Download
#1 - Unprotected id parameter
-----------------------------
In check-in.php the id variable is not filtered so that one can put in
additional SQL statements. I have been able to get a UNION SELECT query
to run but I do not think it's exploitable because there is a second
query that runs with the id variable that will fail. None-the-less it is
possible to get my string to the interpreter as valid SQL.

#2 - Password reset allows anyone to reset the admin password
-------------------------------------------------------------
forgot_password.php does not have any authentication or checking to make
sure the user is only changing their password. So, an unauthenticated
user can reset the password of any account if this functionality is
enabled. It is disabled by default.

#3 - ACL broken for restricted documents
----------------------------------------
Assume a user uploads a file and put restricted access control around it
preventing any other users from accessing it through the software
interface. If an attacker were to change the aku parameter to include
the restricted file number they would be able to use the check-out.php
page to retrieve the restricted file.


Thanks to Stephen Laurence, the developer for this OSS project, for the
quick replies. These issues were addressed by the developer (although I
did not test the changes). Please download the latest version.

Ken
http://silverbackventuresllc.com
Login or Register to add favorites

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    3 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    33 Files
  • 26
    Oct 26th
    27 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close