header-logo
Suggest Exploit
vendor:
MyDMS
by:
Unknown
7.5
CVSS
HIGH
Directory Traversal, SQL Injection
22, 89
CWE
Product Name: MyDMS
Affected Version From: Unknown
Affected Version To: 1.4.2 for SQL injection, 1.4.3 for directory traversal
Patch Exists: YES
Related CWE:
CPE: a:mydms_project:mydms
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

MyDMS Directory Traversal and SQL Injection Vulnerabilities

MyDMS is susceptible to a directory traversal vulnerability, allowing registered users to download arbitrary web server readable files, and an SQL injection vulnerability, allowing attackers to compromise the application and manipulate data or exploit vulnerabilities in the underlying database implementation.

Mitigation:

Upgrade to version 1.4.3 to fix the directory traversal vulnerability and version 1.4.2 to fix the SQL injection vulnerability.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10996/info

MyDMS is reportedly susceptible to both a directory traversal vulnerability and an SQL injection vulnerability.

The SQL injection vulnerability is present because a script improperly sanitizes user-supplied data located in a URI argument before using the value in an SQL statement.

Successful exploitation of the SQL injection vulnerability could result in compromise of the application, disclosure or modification of data or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

The directory traversal vulnerability reportedly allows registered users to download arbitrary web server readable files from the hosting computer. This is due to a failure of the application to properly sanitize user-supplied input data consisting of '../' directory traversal sequences.

Successful exploitation of the directory traversal vulnerability could result in an attacker gaining access to the contents of potentially sensitive files on the hosting computer. This may aid them in further attacks against the host computer.

The SQL injection is reportedly fixed in version 1.4.2. Versions prior to this are reported to be susceptible. The directory traversal vulnerability is fixed in version 1.4.3. 

http://www.example.com/demo/out/out.ViewFolder.php?folderid=3 or 1=1

An example for the directory traversal vulnerability:
http://www.example.com/mydms/op/op.ViewOnline.php?request=4:6:/../../../../../etc/passwd