SECUNIA ADVISORY ID: SA22616
VERIFY ADVISORY: http://secunia.com/advisories/22616/
CRITICAL: Moderately critical
IMPACT: Manipulation of data
WHERE: >From remote
SOFTWARE: PHPEasyData Pro 2.x - http://secunia.com/product/12454/
DESCRIPTION: ajann has reported a vulnerability in PHPEasyData Pro, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "cat" parameter in index.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability is reported in version 2.2.2. Other versions may also be affected.
SOLUTION: Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY: ajann
ORIGINAL ADVISORY: http://milw0rm.com/exploits/2675
PHPEasyData Pro *cat* SQL Injection VulnerabilityPosted on Wednesday, November 01, 2006 @ 01:10:28 CST in Security |