Описание
OpenSTAManager has a SQL Injection in ajax_select.php (componenti endpoint)
Summary
A SQL Injection vulnerability exists in the ajax_select.php endpoint when handling the componenti operation. An authenticated attacker can inject malicious SQL code through the options[matricola] parameter.
Proof of Concept
Vulnerable Code
File: modules/impianti/ajax/select.php:122-124
Data Flow
- Source:
$_GET['options']['matricola']→$superselect['matricola'] - Vulnerable: User input concatenated directly into
IN()clause without sanitization - Sink: Query executed via AJAX framework
Exploit
Manual PoC (Time-based Blind SQLi):
SQLMap Exploitation:
SQLMap Output:
Impact
- Data Exfiltration: Time-based blind SQL Injection allows complete database extraction
- Authentication Bypass: Access to sensitive component and equipment data
- Data Manipulation: Potential unauthorized modification of records
Remediation
Cast values to integers before using in SQL:
Before:
After:
Credit
Discovered by: Łukasz Rybak
Пакеты
devcode-it/openstamanager
<= 2.9.8
Отсутствует
Связанные уязвимости
OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, an SQL Injection vulnerability exists in the ajax_select.php endpoint when handling the componenti operation. An authenticated attacker can inject malicious SQL code through the options[matricola] parameter.