by r0t,der4444,cembo,VietMafia

Friday, December 16, 2005

paFileDB Extreme Edition SQL inj

paFileDB Extreme Edition SQL inj

Vuln. discovered by : r0t
Date: 16 dec. 2005
vendor:http://pafiledb.byethost15.com/
affected version:RC 5 and prior


Product Description:

The core of this script is based on paFileDB 3.1 but with alot features (that`s why i call it Extreme Edition). These are some of the features: - 4 level sub category - 3 different ways to calculate the filesize of a file (so that the script can run on free servers to) - highly advanced screenshot/thumbnailing settings - download screenshots to your server (if supported) - show thumbnails in the category and viewall view - tons of settings that you can change in the admin panel (no need to edit the source or edit sql query`s by hand) - build in news management/system page numbers if there are a x number reply`s - small logging system (for adding/editing/deleting things) - secured comment system - advanced settings for the comments system like br`s and smily`s Feel free to test it!! it`s FREE


Vuln. Description:

paFileDB Extreme Edition contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed "newsid" "id" in "pafiledb.php" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

examples:

/pafiledb.php?news=showcontent&newsid=[SQL]
/pafiledb.php?action=category&id=[SQL]

Solution:
Edit the source code to ensure that input is properly sanitised.

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew