by r0t,der4444,cembo,VietMafia

Monday, November 28, 2005

Enterprise Connector SQL inj. vuln.

Enterprise Connector SQL inj. vuln.
Vuln. dicovered by : r0t
Date: 28 nov. 2005
Vendor:http://www.enterpriseheart.com/site/modules/news/
affected version:1.0.2 and prior

Vuln. description:
Input passed to the "messageid" parameter in "send.php" and "messages.php" isn't properly sanitised before being used in a SQL query.This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

examples:
/send.php?messageid=[SQL]
/messages.php?action=delete&messageid=[SQL]


Solution:
Edit the source code to ensure that input is properly sanitised.

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew