You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
At last, self::ITEM_SEARCH_METHOD is referenced to coreSearch(/includes/classes/ia.core.users.php), it has the code, it's purpose it to excute sql, and $stmt is can be controlled as
it is construct from client-side data $GET:
description
Subrion cms 4.1.4 has a sql injection because $GET
details
critical code in /front/search.php, $GET is passed to doAjaxItemSearch with no checking
doAjaxItemSearch in /includes/classes/ia.front.search.php
There is a _processParams in doAjaxItemSearch, it has the code, it's purpose is retrive parameter from $GET:
There is a _callInstanceMethod in doAjaxItemSearch, it has the code, it's purpose is call a user function:
There is a _getQueryStmtByParams in _callInstanceMethod, it has the code, it's purpose is to construct a key-value-array string from parameter:
At last, self::ITEM_SEARCH_METHOD is referenced to coreSearch(/includes/classes/ia.core.users.php), it has the code, it's purpose it to excute sql, and $stmt is can be controlled as
it is construct from client-side data $GET:
So there exist a sql injection vulnerability.
POC: get database user via sql injection
http://localhost/search/members.json?id%60%3D-1%29%2f%2a%2a%2funion%2f%2a%2a%2fselect%2f%2a%2a%2f1%2C2%2C3%2C4%2C5%2C6%2C7%2C8%2C9%2C10%2C11%2Cuser%28%29%2C13%2C14%2C15%2C16%2C17%2C18%2C19%2C20%2C21%2C22%2C23%2C24%2C25%2C26%2C27%2C28%2C29%2C30%2C31%2C32%23balisong=1
Credit: ADLab of VenusTech
The text was updated successfully, but these errors were encountered: