by r0t,der4444,cembo,VietMafia

Monday, December 05, 2005

PluggedOut Nexus SQL&XSS vuln.

PluggedOut Nexus SQL&XSS vuln.
Vuln. dicovered by : r0t
Date: 6 dec. 2005
vendor:www.pluggedout.com/index.php?pk=dev_nexus
affected version:0.1

Product Description:
Nexus is an open source script you can run on your web server to give you a community based website where people can register, search each others interests, and communicate with one another either through a private messaging system, or via chat requests and forums.

Vuln. Description:
Input passed to the "Location" "Last Name" "First Name" field parameters in "search.php" isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and also it can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Solution:
Edit the source code to ensure that input is properly sanitised.

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew