CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Lifecycle Timeline
4Tags
Description
Next Click Ventures RealtyScript 4.0.2 contains multiple time-based blind SQL injection vulnerabilities that allow unauthenticated attackers to extract database information by injecting SQL code into application parameters. Attackers can craft requests with time-delay payloads to infer database contents character by character based on response timing differences.
Analysis
Multiple time-based blind SQL injection vulnerabilities in RealtyScript 4.0.2 allow unauthenticated remote attackers to extract database information by injecting malicious SQL queries with time-delay payloads. Attackers can infer database contents character by character based on response timing differences. A public proof-of-concept exploit is available on Exploit-DB, significantly increasing the risk of exploitation.
Technical Context
The vulnerability affects Next Click Ventures RealtyScript version 4.0.2 (CPE: cpe:2.3:a:next_click_ventures:realtyscript:*:*:*:*:*:*:*:*), a real estate listing management application. As a CWE-89 (SQL Injection) vulnerability, it stems from improper neutralization of special elements used in SQL commands. The application fails to properly sanitize user input before incorporating it into SQL queries, allowing attackers to inject time-based SQL payloads (e.g., SLEEP() or WAITFOR DELAY) to extract data through inference based on response delays.
Affected Products
Next Click Ventures RealtyScript version 4.0.2 is confirmed vulnerable according to ENISA EUVD-2015-9421. The CPE string indicates all configurations of RealtyScript are potentially affected, though only version 4.0.2 is specifically confirmed. The vulnerability affects multiple application parameters that can be exploited without authentication.
Remediation
No patch information is available in the provided references. Organizations should immediately upgrade from RealtyScript 4.0.2 to the latest version if available. As interim mitigations: implement web application firewall (WAF) rules to detect SQL injection patterns, enable database query logging to detect exploitation attempts, and consider restricting network access to the application. Contact Next Click Ventures for patch availability. The vendor advisories at zeroscience.mk and vulncheck.com may contain additional remediation details.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2015-9421