what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

MiniNukev2.x.txt

MiniNukev2.x.txt
Posted May 29, 2006
Authored by Mustafa Can Bjorn | Site nukedx.com

MiniNuke v2.x suffers from SQL injection

tags | advisory, sql injection
SHA-256 | b3c3a12e93cc677c73db8bb7a4d8a8f1b2a9501a36dcd2eab684d8df9b041266

MiniNukev2.x.txt

Change Mirror Download
--Security Report--
Advisory: MiniNuke v2.x Multiple Remote Vulnerabilities
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 27/05/06 03:16 PM
---
Contacts:{
ICQ: 10072
MSN/Email: nukedx@nukedx.com
Web: http://www.nukedx.com
}
---
Vendor: MiniNuke (http://www.miniex.net/) (http://www.mini-nuke.info/)
Version: 2.3 and prior versions must be affected.
About: Via this method remote attacker can inject arbitrary SQL query
to Your_Account.asp. The problem is that
yas_1,yas_2 and yas_3 parameters did not sanitized properly before
using them on SQL query.This can be caused to remote
attacker could change the SQL query line and change his rights on MiniNuke.
Vulnerable codes can be found at lines 39-79..
-Code/39&79-
yas = Request.Form("yas_1") & "." & Request.Form("yas_2") & "." &
Request.Form("yas_3")
...
...
...
Connection.Execute("UPDATE MEMBERS SET yas = '"&yas&"' WHERE uye_id =
"&Session("Uye_ID")&"")
-Code/39&79-
Fixing this vulnerability is so easy change the line 39 to this.
-Fixed/39-
yas = duz(Request.Form("yas_1")) & "." & duz(Request.Form("yas_2")) &
"." & duz(Request.Form("yas_3"))
-Fixed/39-
Another SQL injection in Your_Account.asp is that change theme for
user, theme parameter did not sanitized properly before
using it on SQL query.
Vulnerable code can be found at line 229..
-Code/229-
Connection.Execute("UPDATE MEMBERS SET
u_theme='"&Request.Form("theme")&"' WHERE uye_id =
"&Session("Uye_ID")&"")
-Code/229-
Fixing this vulnerability is so easy change the line to this
-Fixed/229-
fixedtheme = duz(Request.Form("theme"))
Connection.Execute("UPDATE MEMBERS SET u_theme='"&fixedtheme&"' WHERE
uye_id = "&Session("Uye_ID")&"")
-Fixed/229-
duz() function is special for MiniNuke it cleans the malicious
characters on based variable.
Second problem is on membership.asp.The security code is made as text
format so it can be easily readable by
remote attacker, and can be used for mass-register so mass-register
can make D.o.S for MiniNuke.
Third problem is on enter.asp the gguvenlik and guvenlik parameters
used in login can be changeable by remote attacker,
this can be cause remote attacker makes a dictionary-attack to specified user.
Level: Critical
Solution: Given
---
How&Example:
POST ->
http://[site]/mndir/enter.asp?gguvenlik=1&guvenlik=1&kuladi=victim&password=pass
With this example remote attacker could make dictionary attack for
getting victim's password.
POST ->
http://[site]/mndir/Your_Account.asp?op=RegTheme&theme=default',seviye='1
And other example for SQL injection in yas params like this.
Login to your account on MiniNuke go to
/Your_Account.asp?op=UpdateProfile and open the source code of page
find yas_3 and change value like YEAR',seviye='1 and edit source
correctly dont forgot to edit Timeline:
* 27/05/2006: Vulnerability found.
* 27/05/2006: Contacted with vendor and waiting reply.
---
Exploit: http://www.nukedx.com/?getxpl=31
---
Original advisory can be found at: http://www.nukedx.com/?viewdoc=31




Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close