| VID |
210050 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The XOOPS program is vulnerable to an SQL injection vulnerability via the 'modules/wfsection/print.php' script. XOOPS is a dynamic object oriented based open source portal system written in PHP. XOOPS WF-Section Module versions prior to 1.02 are vulnerable to an SQL injection vulnerability, caused by improper validation of user-supplied input passed to the 'articleid' parameter of the 'modules/wfsection/print.php' script. Regardless of PHP's 'magic_quotes_gpc' setting, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://support.sirium.net/modules/mydownloads/viewcat.php?cid=2 http://www.securityfocus.com/archive/1/463916/30/0/threaded
* Platforms Affected: Xoops WF-Section Module versions prior to 1.02 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Xoops WF-Section Module (1.02 or later), available from the Xoops WF-Section Module Web site at http://www.xoops.org/modules/news/article.php?storyid=3717 |
| Related URL |
CVE-2007-1974 (CVE) |
| Related URL |
23259 (SecurityFocus) |
| Related URL |
33378 (ISS) |
|