Ravens PHP Scripts

PHPEasyData Pro *cat* SQL Injection Vulnerability
Date: Wednesday, November 01, 2006 @ 01:10:28 CST
Topic: Security


SECUNIA ADVISORY ID: SA22616

VERIFY ADVISORY: http://secunia.com/advisories/22616/

CRITICAL: Moderately critical

IMPACT: Manipulation of data

WHERE: >From remote

SOFTWARE: PHPEasyData Pro 2.x - http://secunia.com/product/12454/

DESCRIPTION: ajann has reported a vulnerability in PHPEasyData Pro, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "cat" parameter in index.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability is reported in version 2.2.2. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY: ajann

ORIGINAL ADVISORY: http://milw0rm.com/exploits/2675








This article comes from Ravens PHP Scripts
https://www.ravenphpscripts.com

The URL for this story is:
https://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2486