what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

helpboxSQL.txt

helpboxSQL.txt
Posted Jul 24, 2004
Authored by Noam Rathaus | Site securiteam.com

HelpBox version 3.0.1 is susceptible to multiple SQL injection attacks, including ones that do not require the attack to be logged in.

tags | advisory, sql injection
SHA-256 | 87e8a6e2016aa8666af63bb99a95022d6d845f836d4c59fa675d2a2e1c2496bd

helpboxSQL.txt

Change Mirror Download
*HelpBox Multiple SQL Injection Vulnerabilties*

*Summary*
The HelpBox <http://www.laytontechnology.com/> product comes in two
flavors, HelpBox Standard (which uses an internal Jet Database) and
HelpBox SQL (which uses Microsoft's SQL server). Most of the ASP pages
that the product uses correctly remove dangerous characters from user
provided input. However, some pages seem to not include such a
protection mechanism. This allows a remote attacker with access to the
server to cause it to execute arbitrary SQL statements (via SQL
Injection vulnerabilities).

*Details*
*Vulnerable Systems:*
* HelpBox version 3.0.1

These SQL injection vulnerabilities is worsen by the fact that some ASP
pages do not require the user to be authenticated to run their
vulnerable SQL code, allowing an unauthenticated user to gain access the
HelpBox product (by creating a new user for himself using a specially
crafted URL that includes SQL code).

The following is a partial list of the ASPs we have found to be vulnerable:
* editcommentenduser.asp - parameter: sys_comment_id [script doesn't
require authentication]
* editsuspensionuser.asp - parameter: sys_suspend_id [script doesn't
require authentication]
* export_data.asp - parameter: table [requires administrative
privileges to HelpBox, but allows exporting of any table in the SQL server]
* manageanalgrouppreference.asp - parameter: sys_analgroup [requires
administrative privileges to HelpBox]
* quickinfoassetrequests.asp - parameter: sys_asset_id [script doesn't
require authentication]
* quickinfoenduserrequests.asp - parameter: sys_eusername [script
doesn't require authentication]
* requestauditlog.asp - parameter: sys_request_id [script doesn't
require authentication]
* requestcommentsenduser.asp - parameter: sys_request_id [script
doesn't require authentication]
* selectrequestapplytemplate.asp - parameter: sys_request_id [requires
administrative privileges to HelpBox]
* selectrequestlink.asp - parameter: sys_request_id [requires
administrative privileges to HelpBox]

Those scripts that do not require authentication also allow a remote
attacker to retrieve sensitive information from the server (apart from
the SQL injection vulnerability).

*Example:*
By issuing the following URL on a HelpBox SQL edition server a SQL
server error the SQL injection vulnerability can be witnessed:
http://vulnerablesite/laytonhelpdesk/editcommentenduser.asp?sys_comment_id=1'

*Vendor Response:*
We have tried contacting the vendor numerous times since 15 April 2004,
we have received automated response, promises to contact us, but nothing
regarding the above vulnerabilities.

*Testing Methodology:*
A few months ago Beyond Security built a new module for its Automated
Scanning Vulnerability Assessment engine to test web sites and web
applications for security vulnerabilities. This module adds the
capability to dynamically crawl through a web site and find
vulnerabilities in its dynamic pages.

This type of tool was considered to be different from the network VA
tools, but we at Beyond Security believe that these two types of tools
should be merged into one, and this is what made us incorporate the Web
Site Security Audit module to our Automated Scanning engine.

For a press release on this integration see:
http://www.beyondsecurity.com/press/2004/press10030402.htm
White paper on the first integrated network and web application
vulnerability scanner: http://www.beyondsecurity.com/webscan-wp.pdf

Our Automated Scanning engine equipped with the Web Site Security Audit
module did all the tests described in this advisory automatically.

*Additional information*
The information has been provided by Noam Rathaus
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close