BugTraq
SQL-Injection in Subjects 2.0 for Postnuke Sep 10 2004 01:20AM
Criolabs (security criolabs net)
************************************************************************
****************************
CRIOLABS

- Software: Subjects 2.0
- Type: Postnuke module
- Vendor: Postnuke Modules Factory.

************************************************************************
****************************

## Software ##

Software: Subjects Postnuke module
Version: 2.0
Plataforms: Unix/Win/PHP/MySQL/Postnuke
Web: http://home.postnuke.ru

## Vendor Description ##

Module is designed for structured store & display text content with a possibility to store
content in file on the disc. Probably, the best one for converting existing based on HTML pages
site to PostNuke.

## Vulnerabilities ##

Sql-Injection in pageid, subid, catid variables.

## Sql-Injection ##


The previous variables are vulnerables to SQL-Injection attacks.
These SQL injection vulnerabilities allow a remote user to inject arbitrary SQL commands.

/index.php?module=subjects&func=listpages&subid=[SQL]
/index.php?module=subjects&func=viewpage&pageid=[SQL]
/index.php?module=subjects&func=listcat&catid=[SQL]




## History ##

Vendor contacted but no response.

## Solution ##

There is no solution at this time, we recommend to remove immediately this module

## Credits ##

Criolabs staff

Original advisory and proof of concept at http://www.criolabs.net/advisories/subjects2.txt

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus