[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: SEO borad: SQL injection
From: ghc () ghc ! ru
Date: 2005-09-27 5:25:35
Message-ID: 20050927052535.3528.qmail () securityfocus ! com
[Download RAW message or body]
Product: SEO-Board
Version: 1.02
Author: Hristo Hristov
URL: http://seo-board.com
VULNERABILITY CLASS: SQL injection through cookie
[PRODUCT DESCRIPTION]
SEO-Board is a forum software that's fast, free, and search engine friendly.
It is written in PHP and use MySQL database.
[VULNERABILITY]
Vulnerable script: admin.php
--[code]--
if (!isset($_COOKIE[$cookiename]))
die('You must be logged as admin to access the admin panel');
list($user_id, $user_pass_sha1) = unserialize(stripslashes($_COOKIE[$cookiename]));
if ($user_id != 1)
die('You must be logged as admin to access the admin panel');
if (!is_numeric($user_id))
die($lang['fatal_error']);
$result = mysql_query("SELECT user_name FROM {$dbpref}users WHERE user_id='$user_id' \
AND
user_pass='$user_pass_sha1'");
if (mysql_num_rows($result) != 1)
die($lang['fatal_error']);
else
$user_name = mysql_result($result, 0);
$admin_panel_link = eval(get_template('adminpanellink'));
--[/code]--
IMPACT:
An attacker can inject SQL statement through cookie. As result anybody can gain \
administrative privelegue.
[BUGFIX]
Upgrade to 1.03 version.
[CREDITS]
RST/GHC
rst.void.ru
www.ghc.ru
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic