by r0t,der4444,cembo,VietMafia

Monday, November 28, 2005

SourceWell SQL inj. vuln.

SourceWell SQL inj. vuln.
Vuln. dicovered by : r0t
Date: 28 nov. 2005
Vendor:http://sourcewell.berlios.de/html/
affected version:1.1.3 and prior

Product Description:
SourceWell is a highly configurable software announcement and retrieval system entirely written in PHP and is based upon a MySQL database. It includes user authentication and authorization system (anonymous/user/editor/admin), sessions with and without cookies, high configurability, multilangual support, ease of administration, RDF-type document backend, advanced statistics, announcing mailing lists, application indexing by sections, installation support and many other useful features.

Vuln. description:
Input passed to the "cnt" parameter in "index.php" isn't properly sanitised before being used in a SQL query.This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

example:
/index.php?start=2005-11-28&days=1&cnt=[SQL]

Solution:
Edit the source code to ensure that input is properly sanitised.

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew