SQL injection in Recipe Manager - #VU5915

 

SQL injection in Recipe Manager - #VU5915

Published: March 6, 2017


Vulnerability identifier: #VU5915
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: N/A
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Landshark Labs
Affected software:
Recipe Manager

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in web application database.

The vulnerability exists due to insufficient sanitization of user-supplied data passed via "id" HTTP GET parameter to "/index.php" script. A remote attacker can send a specially crafted HTTP GET request to vulnerable script and execute arbitrary SQL queries in web application database.

Successful exploitation of the vulnerability may allow an attacker to gain complete control over affected website.

PoC-code

http://[host]/index.php?option=com_recipe&view=recipes&task=print_ingred&id=[SQL]

Remediation

The vulnerable version is Recipe Manager v2.2, other versions may also be affected.
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources