•  
      request #7895 Blind SQL injection in the most active projects page
    Infos
    #7895
    Thomas Gerbet (tgerbet)
    2015-03-04 16:22
    2015-02-27 10:44
    7908
    Details
    Blind SQL injection in the most active projects page

    Tuleap does not sanitize properly user inputs when constructing a SQL query for listing the most active projects.

    Impact

    An attacker could execute arbitrary SQL queries.
    CVSSv2 score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

    Exploitation

    The page <tuleap_url>/top/mostactive.php is exploitable via the parameter offset.

    The vulnerability can be demonstrated using this query:
    <tuleap_url>/top/mostactive.php?offset=1 PROCEDURE analyse((select extractvalue(0,BENCHMARK(50000000,SHA1(1)))),1)%23
    When the vulnerability is present, the query will take a large amount of time to be executed by the DBMS.

    References

    https://cwe.mitre.org/data/definitions/89.html
    https://www.owasp.org/index.php/SQL_Injection
    https://rateip.com/blog/sql-injections-in-mysql-limit-clause/

    Other
    All
    Empty
    • [ ] enhancement
    • [ ] internal improvement
    Empty
    Stage
    Empty
    Closed
    2015-03-02
    Attachments
    Empty
    References

    Follow-ups

    User avatar
    Merged in 7.10.99.59

    • Status changed from Under review to Closed
    • Close date set to 2015-03-02