BugTraq
Phorum 5.1.14 XSS SQL injection Vulnerability Jul 11 2006 09:10AM
securityconnection gmail com (1 replies)
Re: Phorum 5.1.14 XSS SQL injection Vulnerability Jul 16 2006 07:59PM
Maurice Makaay (maurice makaay internl net)
About the Phorum security issues as reported by Ellipsis:

> --------------------------
> Cross Site Scripting (XSS)
> --------------------------
> POST http://target.xx:80/posting.php HTTP/1.0
> Accept: */*
> Content-Type: application/x-www-form-urlencoded
> Host: target.xx
> Content-Length: 447
> message_id=0&forum_id=1&mode=<script>alert(/EllipsisSecurityTest/)</scri
pt>

This problem was already detected and fixed by ourselves in the recently
released Phorum 5.1.15.

> -------------
> SQL injection
> -------------
> http://target.xx/search.php?1,search=1,page='[SQL]

This is *not* an SQL injection vulnerability. On wrong input for page,
the internally used value of page would become -1, which was then used
in a limit clause. This would in turn cause an SQL statement error.
There is no way in which this could be exploited for arbitrary SQL
injection. Ellipsis probably did not check the code here, but decided
they found an SQL injection vulnerability based on an SQL error that was
returned by automatic vulnerability checking.

This problem was fixed in Phorum 5.1.15 as well.

With kind regards,

Maurice Makaay
Phorum.org developer

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus