ID

VAR-E-201309-0248


CVE

cve_id:CVE-2013-5091

Trust: 2.4

sources: BID: 62487 // PACKETSTORM: 123296 // EXPLOIT-DB: 28409 // EDBNET: 50240

EDB ID

28409


TITLE

vTiger CRM 5.4.0 - 'index.php?onlyforuser' SQL Injection - PHP webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 28409

DESCRIPTION

vTiger CRM 5.4.0 - 'index.php?onlyforuser' SQL Injection. CVE-2013-5091CVE-97504 . webapps exploit for PHP platform

Trust: 0.6

sources: EXPLOIT-DB: 28409

AFFECTED PRODUCTS

vendor:vtigermodel:crmscope:eqversion:5.4.0

Trust: 2.1

vendor:vtigermodel:crmscope:eqversion:5.3

Trust: 0.3

vendor:vtigermodel:crmscope:eqversion:5.2.1

Trust: 0.3

vendor:vtigermodel:crmscope:eqversion:5.2

Trust: 0.3

sources: BID: 62487 // PACKETSTORM: 123296 // EXPLOIT-DB: 28409 // EDBNET: 50240

EXPLOIT

Advisory ID: HTB23168
Product: vtiger CRM
Vendor: vtiger
Vulnerable Version(s): 5.4.0 and probably prior
Tested Version: 5.4.0
Vendor Notification: August 7, 2013
Vendor Patch: September 17, 2013
Public Disclosure: September 18, 2013
Vulnerability Type: SQL Injection [CWE-89]
CVE Reference: CVE-2013-5091
Risk Level: Medium
CVSSv2 Base Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Solution Status: Fixed by Vendor
Discovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ )

-----------------------------------------------------------------------------------------------

Advisory Details:

High-Tech Bridge Security Research Lab discovered SQL injection vulnerability in vtiger CRM, which can be exploited to execute arbitrary SQL commands in application's database.

1) SQL Injection in vtiger CRM: CVE-2013-5091

The vulnerability exists due to insufficient validation of "onlyforuser" HTTP GET parameter passed to "/index.php" script. A remote authenticated user can execute arbitrary SQL commands in application's database.

The following exploitation example displays version of MySQL server:

http://[host]/index.php?action=index&day=22&hour=0&module=Calendar&month=7&onlyforuser=1%20%20UNION%20SELECT%201,2,3,4,5,6,version%28%29,8,9,10,11,12,13,14,15,16,17,18,19,20,1,22,23,24,25,26,27,28,29,30,31,32%20--%20&parenttab=My%20Home%20Page&subtab=event&view=day&viewOption=hourview&year=2013

Successful exploitation of this vulnerability requires the attacker to be registered and logged-in. The registration is disabled by default.

-----------------------------------------------------------------------------------------------

Solution:

Vendor has issued a fixed version of the vulnerable script "VtigerCRM540_Security_Patch2.zip" available for download at:
http://sourceforge.net/projects/vtigercrm/files/vtiger%20CRM%205.4.0/Core%20Product/

-----------------------------------------------------------------------------------------------

References:

[1] High-Tech Bridge Advisory HTB23168 - https://www.htbridge.com/advisory/HTB23168 - SQL Injection in vtiger CRM.
[2] vtiger CRM - vtiger.com – vtiger CRM is an on demand customer relationship management software that provides sales, marketing, and support teams with powerful tools to efficiently and effectively collaborate in providing the ideal customer experience.
[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
[5] ImmuniWeb® - http://www.htbridge.com/immuniweb/ - is High-Tech Bridge's proprietary web application security assessment solution with SaaS delivery model that combines manual and automated vulnerability testing.

-----------------------------------------------------------------------------------------------

Disclaimer: The information provided in this Advisory is provided "as is" and without any warranty of any kind. Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on web page [1] in the References.

Trust: 1.0

sources: EXPLOIT-DB: 28409

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 28409

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 28409

TYPE

sql injection

Trust: 1.1

sources: PACKETSTORM: 123296 // EDBNET: 50240

TAGS

tag:exploit

Trust: 0.5

tag:remote

Trust: 0.5

tag:sql injection

Trust: 0.5

sources: PACKETSTORM: 123296

CREDITS

High-Tech Bridge SA

Trust: 0.6

sources: EXPLOIT-DB: 28409

EXTERNAL IDS

db:NVDid:CVE-2013-5091

Trust: 2.4

db:IMMUNIWEBid:HTB23168

Trust: 2.1

db:EXPLOIT-DBid:28409

Trust: 1.6

db:EDBNETid:50240

Trust: 0.6

db:PACKETSTORMid:123296

Trust: 0.5

db:BIDid:62487

Trust: 0.3

sources: BID: 62487 // PACKETSTORM: 123296 // EXPLOIT-DB: 28409 // EDBNET: 50240

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2013-5091

Trust: 2.1

url:https://www.htbridge.com/advisory/htb23168

Trust: 1.0

url:https://www.exploit-db.com/exploits/28409/

Trust: 0.6

url:http://www.vtiger.com/

Trust: 0.3

sources: BID: 62487 // PACKETSTORM: 123296 // EXPLOIT-DB: 28409 // EDBNET: 50240

SOURCES

db:BIDid:62487
db:PACKETSTORMid:123296
db:EXPLOIT-DBid:28409
db:EDBNETid:50240

LAST UPDATE DATE

2022-07-27T09:30:10.945000+00:00


SOURCES UPDATE DATE

db:BIDid:62487date:2013-09-18T00:00:00

SOURCES RELEASE DATE

db:BIDid:62487date:2013-09-18T00:00:00
db:PACKETSTORMid:123296date:2013-09-18T17:18:23
db:EXPLOIT-DBid:28409date:2013-09-20T00:00:00
db:EDBNETid:50240date:2013-09-20T00:00:00