Korean
<< Back
VID 21387
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The PHP-Fusion, according to the version number, has a SQL Injection Vulnerability.
PHP-Fusion is a freely available PHP-based content management system (CMS) that uses a MySQL backend database. PHP-Fusion version 4.01 and possibly earlier versions are vulnerable to a SQL Injection Attack, caused by a failure of the application to properly sanitize user-supplied input data. By sending a specially-crafted request to the 'members.php' or 'comments.php' script containing embedded SQL commands in the 'rowstart' or the 'comment_id' parameter respectively, a remote authenticated attacker could execute arbitrary code on the system, including to add, modify or delete data in the backend database.

* Note: This check solely relied on the version number of the remote PHP-Fusion installed on the web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.osvdb.org/displayvuln.php?osvdb_id=10437
http://www.osvdb.org/displayvuln.php?osvdb_id=10438
http://www.osvdb.org/displayvuln.php?osvdb_id=10439

* Platforms Affected:
digitanium, PHP-Fusion 4.01 and possibly prior
Any operating system Any version
Recommendation No upgrade or patch available as of October 2004.

Upgrade to the new version of PHP-Fusion, when new version fixed this problem becomes available from the PHP-Fusion Web site at http://sourceforge.net/projects/php-fusion/
Related URL CVE-2004-2437 (CVE)
Related URL 11296 (SecurityFocus)
Related URL 17546 (ISS)