Internet Software Sciences's Web+Center SQL Injection
21 Jul. 2004
Internet Software Sciences's Web+Center is "A suite of web based customer support applications including:
The Web+Center does a good job of filtering out malicious content from incoming user provided data (given via GET and POST requests), however neglects to verify whether malicious data is entered via the Cookie object. Due to this at least one exploitable SQL Injection vulnerability that would allow an anonymous user to at the very least gain administrative privileges to the Internet Software Sciences's Web+Center product, at the worst case he will be able to get complete control over (administrative privileges) the computer on which the Internet Software Sciences's Web+Center is installed and utilize it to gain access to other computers.
* Internet Software Sciences's Web+Center version 4.0.1
As a lot of pages use the Cookie object, but some require a user to logon prior to been able to access the page, we have chosen to show the vulnerability via the search.asp page found under the tech40 directory.
Other directories also contain such vulnerable pages, customer40's DoCustomerOptions.asp one such example.
If we insert a malicious SQL statement to the Cookie object, we can modify the 'tech_staff' table, and add a new user that will have the permissions of as an operator (tech_level 6).
Depending on what other information is stored on the SQL server, and how it was hardened we could obtain:
1) SQL's administrative username and password
2) Execute commands via MS SQL's extended procedure (xp_cmdshell)
3) Trick users into downloading Trojan horses (by providing them with solutions for their Tickets) etc.
See the below exploit code demonstrating how we gain administrative privileges to Internet Software Sciences's Web+Center, no special information is required beside the hostname, and the path under which the search.asp page can be located.
Vendor response: Our engineers has reviewed the security vulnerability and we are working on a updated version of our cookie tech check code that will be implemented in our next version. We had already planned to implement a more modularized version of the tech security code, so it will be easy to check for SQL injection strings in this new modularized code. Thanks for pointing this out and to making our product more secure.
A few months ago Beyond Security built a new module for its Automated Scanning Vulnerability Assessment engine to test web sites and web applications for security vulnerabilities. This module adds the capability to dynamically crawl through a web site and find vulnerabilities in its dynamic pages.
This type of tool was considered to be different from the network VA tools, but we at Beyond Security believe that these two types of tools should be merged into one, and this is what made us incorporate the Web Site Security Audit module to our Automated Scanning engine.