exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Imperva SecureSphere WAF MX 9.5.6 SQL Injection

Imperva SecureSphere WAF MX 9.5.6 SQL Injection
Posted Oct 10, 2013
Authored by Mattia Folador, Giuseppe D'Amore

Imperva SecureSphere WAF MX version 9.5.6 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 52af25e0aaf58f7639edcd6675d339141171ec2a7c673ffaa2704d59cd107936

Imperva SecureSphere WAF MX 9.5.6 SQL Injection

Change Mirror Download
Blind SQL Injection to Imperva SecureSphere Web Application Firewall MX
=======================================================================

[ADVISORY INFORMATION]
Title: Blind SQL Injection on Imperva SecureSphere Web Application Firewall MX
Discovery date: 09/04/2013
Release date: 09/10/2013
Vendor Homepage: www.imperva.com
Version: Imperva SecureSphere WAF MX 9.5.6
Credits: Giuseppe D'Amore (g-damore@outlook.com), Mattia Folador (mattia.folador@gmail.com)

[VULNERABILITY INFORMATION]
Class: Blind SQL Injection

AFFECTED PRODUCTS]
This security vulnerability affects:

* Imperva SecureSphere WAF Management Web Console (MX), version 9.5.6

[VULNERABILITY DETAILS]
The management console of Imperva WAF allows an authenticated user having the only privilege to view lookup dataset, to perform a privilege escalation, and extract through a blind sql injection, the MD5 hash of Administrator's account on the console.

If you inject this query:

stringindatasetchoosen%%' and 1 = any (select 1 from SECURE.CONF_SECURE_MEMBERS where FULL_NAME like '%%dministrator' and rownum<=1 and PASSWORD like '0%') and '1%%'='1

into the search box under the Main Menu->Setup->Global Object->Scope Selection (Data Lookup)->Lookup Data Set, it is possible (depending on whether the query returns true or false) to extract the MD5 hash of the password of the Administrator's account on the console so:

If the query return true then I see the searched string (stringindatasetchoosen), this means that the Administrator MD5 hashed password start with 0 character, by doing this, I can enumerate entire MD5, by injecting query like:

and PASSWORD like '0% -> to find the first character, once you find the first character, I inject:
and PASSWORD like '0a% -> to find second character
and so on until you discover all 32 characters of hash.

[REMEDIATION]
This issue has been addressed by Imperva in the following patch release:

* Patch 8.0 (August 30, 2013)

[DISCLOSURE TIME-LINE]
* 09/04/2012 - Initial vendor contact.

* 11/07/2013 - Imperva confirmed the issue is a new security vulnerability.

* 30/08/2013 - Imperva released a new patch that address the vulnerability.

* 09/10/2013 - Public disclosure.

[DISCLAIMER]
The author is not responsible for the misuse of the information provided in
this security advisory. The advisory is a service to the professional security
community. There are NO WARRANTIES with regard to this information. Any
application or distribution of this information constitutes acceptance AS IS,
at the user's own risk. This information is subject to change without notice.


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close