
Arastta 1.1.5: SQL Injection
Date: 2015-12-21 10:52:291. Introduction
Affected Product: | Arastta 1.1.5 |
Fixed in: | not fixed |
Fixed Version Link: | n/a |
Vendor Website: | http://arastta.org/ |
Vulnerability Type: | SQL Injection |
Remote Exploitable: | Yes |
Reported to vendor: | 11/21/2015 |
Disclosed to public: | 12/21/2015 |
Release mode: | Full Disclosure |
CVE: | n/a |
Credits | Tim Coen of Curesec GmbH |
2. Overview
Arastta is an eCommerce software written in PHP. In version 1.1.5, it is vulnerable to two SQL injection vulnerabilities, one normal injection when searching for products via tags, and one blind injection via the language setting. Both of them require a user with special privileges to trigger.
3. SQL Injection 1
CVSS
Medium 6.5 AV:N/AC:L/Au:S/C:P/I:P/A:P
Description
There is an SQL Injection when retrieving products.
Currently, only the "filter" variable is vulnerable. Note that the "tag_name" variable would also be vulnerable to SQL injection, if there wasn't a filter that forbid single quotes in the URL. As defense in depth, it might be a good idea to sanitize that value here as well.
Note that an account with the right "Catalog -> Filters" is needed to exploit this issue.
Proof of Concept
Code
4. SQL Injection 2
CVSS
Medium 6.5 AV:N/AC:L/Au:S/C:P/I:P/A:P
Description
There is a second order timing based SQL injection when choosing the language setting.
An admin account with the right "Setting -> Setting" is needed to exploit this issue.
Alternatively, a user with the right "Localisation -> Languages" can inject a payload as well. However, a user with the right "Setting -> Setting" is still needed to choose the malicious language to trigger the payload.
Proof of Concept
Code
5. Solution
This issue was not fixed by the vendor.
6. Report Timeline
11/21/2015 | Informed Vendor about Issue (no reply) |
12/10/2015 | Reminded Vendor of Disclosure Date (no reply) |
12/17/2015 | Disclosed to public |