by r0t,der4444,cembo,VietMafia

Thursday, November 24, 2005

ActiveCampaign KnowledgeBuilder Vuln.

ActiveCampaign KnowledgeBuilder SQL Injection and Denial of Service.
Vuln. dicovered by : r0t
Date: 24 nov. 2005
Vendor:http://www.activecampaign.com/kb/
KnowledgeBuilder Version: 2.4 and prior

Vuln. description:

1.
Input passed to the "article" parameter in "index.php" isn't properly sanitised before being used in a SQL query.This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
example:
http://host/KnowledgeBuilder/index.php?article=[SQL]


Successful exploitation requires that "magic_quotes_gpc" is disabled.

2.
Input passed to the "category" parameter in "index.php" isn't properly verified, before it is used when sending requests to the database. This can be exploited to cause a large amount of SQL queries to be sent to the database via an invalid "category" parameter.

Successful exploitation causes a vulnerable system to consume a large amount of CPU resources.


Solution:
Edit the source code to ensure that input is properly sanitised.

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew