rauLink Software Domotica Web 2.0 SQL Injection Authentication Bypass

Title: rauLink Software Domotica Web 2.0 SQL Injection Authentication Bypass
Advisory ID: ZSL-2020-5572
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information, Manipulation of Data
Risk: (5/5)
Release Date: 05.07.2020
Summary
Smart home automation software.
Description
The application suffers from an SQL Injection vulnerability. Input passed through 'usuario' POST parameter in registraUsuario is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and bypass the authentication mechanism.
Vendor
rauLink Software (raulsoria)
Affected Version
2.0
Tested On
Apache/2.4.6 (Ubuntu)
PHP/5.5.3-1ubuntu2.6
phpPgAdmin/5.1
Vendor Status
N/A
PoC
domoticaraul_auth.txt
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] https://packetstormsecurity.com/files/158318/rauLink-Software-Domotica-Web-2.0-SQL-Injection.html
[2] https://cxsecurity.com/issue/WLB-2020070026
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/184654
Changelog
[05.07.2020] - Initial release
[07.07.2020] - Added reference [1]
[19.07.2020] - Added reference [2]
[20.07.2020] - Added reference [3]
Contact
Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk