RunCMS Multiple Input Validation Vulnerabilities

An attacker can exploit these issues via a browser. To exploit a cross-site scripting issue, the attacker must entice an unsuspecting victim to follow a malicious URI.

The following SQL-injection examples were provided:

http://www.example.com/[installdir]/modules/mydownloads/brokenfile.php?lid+DSecRG_INJECTION
http://www.example.com/[installdir]/modules/mydownloads/visit.php?lid=2+DSecRG_INJECTION
http://www.example.com/[installdir]/modules/mydownloads/ratefile.php?lid=2+DSecRG_INJECTION
http://www.example.com/[installdir]/modules/mylinks/ratelink.php?lid=2+DSecRG_INJECTION
http://www.example.com/[installdir]/modules/mylinks/modlink.php?lid=2+DSecRG_INJECTION
http://www.example.com/[installdir]/modules/mylinks/brokenlink.php?lid=2+DSecRG_INJECTION

Further examples may be found in the references.


 

Privacy Statement
Copyright 2010, SecurityFocus