SQL Injection in Service Group feature of SmartVista SVFE2 version 2.2.22 (CVE-2022-38615)
CVE-2022-38615
Exploit Title: SQL Injection in Service Group feature of SmartVista SVFE2 version 2.2.22
Date: 26/07/2022
Exploit Author: Tin Pham aka TF1T of VietSunshine Cyber Security Services
Vendor Homepage: https://www.bpcbt.com/
Affected Version(s): SmartVista SVFE2 version 2.2.22
Description: SmartVista SVFE2 version 2.2.22 and earlier are affected by an SQL Injection vulnerability. An authenticated users could inject SQL query to "UserForm:j_id88", "UserForm:j_id90", "UserForm:j_id92" parameters (Group ID, Service ID and Description) in /SVFE2/pages/feegroups/service_group.jsf to dump all databases.
Steps to reproduce:
An attacker requires an account on the SmartVista SVFE2. Attacker can use a quote character to break query string and inject sql payload to "UserForm:j_id92" parameter (Description), don't use a quote character and inject sql payload to "UserForm:j_id88", "UserForm:j_id90" parameters (Group ID, Service ID), in /SVFE2/pages/feegroups/service_group.jsf. Response data could help an attacker identify whether an injected SQL query is correct or not.
Example of injecting SQL to "UserForm:j_id92" parameter (Description):
'or '1%' LIKE '1 -> Correct query -> Return all rows in current table
'or '1%' LIKE '0 -> Wrong query -> Return 0 row
Example of injecting SQL to "UserForm:j_id88", "UserForm:j_id90" parameters (Group ID, Service ID)
1 or 1=1 -> Correct query -> Return all rows in current table
1 or 1=0 -> Wrong query -> Return 0 row
Last updated