SQL injection in OneVote! - #VU5913

 

SQL injection in OneVote! - #VU5913

Published: March 6, 2017


Vulnerability identifier: #VU5913
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: N/A
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Advanced Computer Systems
Affected software:
OneVote!

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in web application database.

The vulnerability exists due to insufficient sanitization of user-supplied data passed via "election_id" HTTP GET parameter to "/components/com_onevote/results.php" script. A remote attacker can send a specially crafted HTTP GET request to vulnerable script and execute arbitrary SQL queries in web application database.

Successful exploitation of the vulnerability may allow an attacker to gain complete control over affected website.

PoC-code

http://[host]/components/com_onevote/results.php?election_id=[SQL]

Remediation

The vulnerable version is OneVote! 1.0.0, other versions may also be affected.
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources