by r0t,der4444,cembo,VietMafia

Thursday, November 24, 2005

iSupport 1.x "include_file" SQL inj.

iSupport 1.x "include_file" SQL inj.
Vuln. dicovered by : r0t
Date: 25 nov. 2005
Vendor:http://www.idevspot.com/
Product link:http://www.idevspot.com/index.php?page=p_detail%7E1
affected vesion: tested on 1.06 and last 1.x

Vuln. Description:
Input passed to the "include_file" parameter in "index.php" isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

example:
/iSupport/index.php?include_file=[SQL]

Solution:
Edit the source code to ensure that input is properly sanitised.


Also i supose that with special crafted request can be possible local file include of core if..or if...:)

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew