Document Title: =============== PHP Melody v3.0 - (vid) SQL Injection Vulnerability References (Source): ==================== Bulletin: Release Date: ============= 2021-10-20 Vulnerability Laboratory ID (VL-ID): ==================================== 2295 Common Vulnerability Scoring System: ==================================== 7 Vulnerability Class: ==================== SQL Injection Current Estimated Price: ======================== 1.000€ - 2.000€ Product & Service Introduction: =============================== Upload, import, stream or embed any media. The smart way to manage audio & video. Comes with all the tools you need for online publishing. Beautiful content for your site. Allow users to create their channels, subscribe and follow the content they like. Podcast, mini-series, TV shows or movies. Everything is easier to publish with our CMS. Invest in a Secure Foundation. Build with a proven CMS. (Copy of the Homepage: ) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered a remote sql-injection web vulnerability in the PHP Melody v3.0 video cms web-application. Affected Product(s): ==================== PHPSUGAR Product: PHP Melody v3.0 - Video CMS (Web-Application) Vulnerability Disclosure Timeline: ================================== 2021-09-01: Researcher Notification & Coordination (Security Researcher) 2021-09-02: Vendor Notification (Security Department) 2021-09-04: Vendor Response/Feedback (Security Department) 2021-09-22: Vendor Fix/Patch (Service Developer Team) 2021-09-22: Security Acknowledgements (Security Department) 2021-10-20: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== High Authentication Type: ==================== Full Authentication (Admin/Root Privileges) User Interaction: ================= No User Interaction Disclosure Type: ================ Responsible Disclosure Technical Details & Description: ================================ A remote sql-injection vulnerability has been discovered in the PHP Melody v3.0 video cms web-application. The vulnerability allows remote attackers to inject or execute own sql commands to compromise the dbms or file system of the web-application. The remote sql injection vulnerability is located in the `vid` parameter of the `edit-video.php` file. Remote attackers with moderator or admin access privileges are able to execute own malicious sql commands by inject get method request. The vid parameter in the acp ui is not sanitized properly. Thus allows an attacker to inject own sql commands to compromise the web-application and dbms. Exploitation of the remote sql injection vulnerability requires no user interaction but a privileged moderator or admin account. Successful exploitation of the remote sql injection results in database management system, web-server and web-application compromise. Request Method(s): [+] GET Vulnerable Module(s): [+] Video Edit Vulnerable File(s): [+] edit-video.php Vulnerable Parameter(s): [+] vid Proof of Concept (PoC): ======================= The remote sql-injection web vulnerability can be exploited by authenticated remote attackers without user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Original: https://phpmelody.localhost:8000/admin/edit-video.php?vid=3435b47dd&a=4&page=1&filter=added&fv=desc PoC: Exploitation #1 https://phpmelody.localhost:8000/admin/edit-video.php?vid=-3435b47dd' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL, CONCAT(0x7171766b71,0x5642646a536b77547366574a4c43577866565270554f56426b6175535a55764259514b6c486e6e69,0x71626a6271), NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- PoC: Exploitation #2 https://phpmelody.localhost:8000/admin/edit-video.php?vid=3435b47dd-' AND (SELECT 1446 FROM (SELECT(SLEEP([SLEEPTIME])))-- PoC: Exploit phpmelody vid sql injection poc