[+]---------------------------------------------------------[+]
| Vulnerable Software: Alio Applicant Portal |
| Vendor:
| Vulnerability Type: SQL Injection |
| Date Released: 31/05/2017 |
| Released by: Digital Gangster |
[+]---------------------------------------------------------[+]
Alio Applicant Portal versions 6.0 and prior are vulnerable to error-based SQL Injection via the
'secid' GET parameter failing to properly sanitize inputs. Alio Applicant Portal is used within the
k12 school system in USA and other international schools and universities to allow applicatints to
electronically sign up for roles (e.g. a student signing up for particular classes or even in some
cases a teacher or lecturer signing up for a job role)
--> Create an account
---> Add something to 'My Resume' and then afterwards click edit.
----> Browse to -
It should be noted that the _vast majority_ of vuln sites are running as DBA
Disclosure Timeline:
* Contacted vendor via email (no response) - 17/03/2017
* Called their call center (confused employees)
* Called their corporate offices (more confused employees)
* Emailed a supposed security contact there (no response) - 28/04/2017
* Disclosed vulnerability - 31/05/2017
# Digital Gangsterr [2017-05-31]
| Vulnerable Software: Alio Applicant Portal |
| Vendor:
Пожалуйста,
Вход
или
Регистрация
для просмотра содержимого URL-адресов!
|| Vulnerability Type: SQL Injection |
| Date Released: 31/05/2017 |
| Released by: Digital Gangster |
[+]---------------------------------------------------------[+]
Alio Applicant Portal versions 6.0 and prior are vulnerable to error-based SQL Injection via the
'secid' GET parameter failing to properly sanitize inputs. Alio Applicant Portal is used within the
k12 school system in USA and other international schools and universities to allow applicatints to
electronically sign up for roles (e.g. a student signing up for particular classes or even in some
cases a teacher or lecturer signing up for a job role)
--> Create an account
---> Add something to 'My Resume' and then afterwards click edit.
----> Browse to -
Пожалуйста,
Вход
или
Регистрация
для просмотра содержимого URL-адресов!
UNION SELECT 1,2,3,4,5,version(),7,8--+-It should be noted that the _vast majority_ of vuln sites are running as DBA
Disclosure Timeline:
* Contacted vendor via email (no response) - 17/03/2017
* Called their call center (confused employees)
* Called their corporate offices (more confused employees)
* Emailed a supposed security contact there (no response) - 28/04/2017
* Disclosed vulnerability - 31/05/2017
# Digital Gangsterr [2017-05-31]