Aerosol Posted March 18, 2015 Report Posted March 18, 2015 *Comsenz SupeSite 7.0 CMS SQL Injection Security Vulnerabilities*Exploit Title: Comsenz SupeSite CMS SQL Injection Security VulnerabilitiesProduct: SupeSite CMS (Content Management System)Vendor: ComsenzVulnerable Versions: 6.0.1UC 7.0Tested Version: 7.0Advisory Publication: March 14, 2015Latest Update: March 14, 2015Vulnerability Type: Improper Neutralization of Special Elements used in anSQL Command ('SQL Injection' [CWE-89]CVE Reference: *Impact CVSS Severity (version 2.0):CVSS v2 Base Score: 7.5 (HIGH) (AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend)Impact Subscore: 6.4Exploitability Subscore: 10.0Discover and Author: Wang Jing [CCRG, Nanyang Technological University(NTU), Singapore]*Suggestion Details:**(1) Vendor & Product Description:**Vendor: *Comsenz*Product & Version:*SupeSite6.0.1UCSupeSite7.0*Vendor URL & Download:*SupeSite can be bought from here,http://www.comsenz.com/products/other/supesitehttp://www.comsenz.com/downloads/install/supesite#down_open*Source code:*http://www.8tiny.com/source/supesite/nav.html?index.html*Product Introduction:*"SupeSite is an independent content management (CMS) function, andintegrates Web2.0 community personal portal system X-Space, has a strongaggregation of community portal systems. SupeSite station can be achievedwithin the forum (Discuz!), personal space (X-Space) information contentaggregation. Any webmaster , are available through SupeSite, easy to builda community portal for Web2.0.""Through grade audit operations, audit managers can publish information onthe station to rank classification, shield, remove the handle, which candisplay information on the effective control of the site's pages. When theaudit information, the audit level is set to shield information, theinformation will no longer appear on the page aggregation site, but theuser's own personal space is still displayed above. If you want tocompletely shield the information, use the delete function. Auditinformation is divided into five levels, you can page polymerizationconditions, freedom of information conducted classification. The defaultuser information released pending state audit level. Administrators can setup the site, set whether to allow the pending status of the informationdisplayed on the site aggregation page."*(2) Vulnerability Details:*SupeSite web application has a security bug problem. It can be exploited bySQL Injection attacks. This may allow an attacker to inject or manipulateSQL queries in the back-end database, allowing for the manipulation ordisclosure of arbitrary data. Other Comsenz products vulnerabilities havebeen found by some other bug hunter researchers before. Comsenz has patchedsome of them. NVD is the U.S. government repository of standards basedvulnerability management data (This data enables automation ofvulnerability management, security measurement, and compliance (e.g.FISMA)). It has published suggestions, advisories, solutions related tosimilar vulnerabilities.*(2.1)* The code programming flaw occurs at "batch.common.php" page with"name" parameter.*References:*http://tetraph.com/security/sql-injection-vulnerability/comsenz-supesite-7-0-cms-sql-injection-security-vulnerabilities/http://securityrelated.blogspot.com/2015/03/comsenz-supesite-70-cms-sql-injection.htmlhttp://www.inzeed.com/kaleidoscope/computer-web-security/comsenz-supesite-7-0-cms-sql-injection-security-vulnerabilities/http://diebiyi.com/articles/%E5%AE%89%E5%85%A8/comsenz-supesite-7-0-cms-sql-injection-security-vulnerabilities/https://infoswift.wordpress.com/2015/03/14/comsenz-supesite-7-0-cms-sql-injection-security-vulnerabilities/http://marc.info/?a=139222176300014&r=1&w=4http://en.hackdig.com/?13972.htm--Wang Jing,Division of Mathematical Sciences (MAS),School of Physical and Mathematical Sciences (SPMS),Nanyang Technological University (NTU),Singapore.http://www.tetraph.com/wangjing/https://twitter.com/tetraphibiousSource Quote