Korean
<< Back
VID 21515
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The paFileDB program is vulnerable to an SQL injection vulnerability in the pafiledb.php script. paFileDB is a Web-based file download management program developed by PHP Arena that uses a MySQL database. paFileDB versions 3.0 Beta and Final and 3.1 Beta and Final allow a remote attacker to execute arbitrary SQL commands, due to the application failing to properly sanitize user-supplied input to the 'id' or 'ratin' parameter before using it in SQL queries in the pafiledb.php script. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://www.securiteam.com/unixfocus/5NP0F0UF5E.html
http://www.securityfocus.com/archive/1/316053
http://www.securityfocus.com/archive/1/323211

* Platforms Affected:
PHP Arena, paFileDB 3.0 Beta and Final
PHP Arena, paFileDB 3.1 Beta and Final
Linux Any version
Microsoft Windows Any version
Unix Any version
Recommendation No upgrade or patch available as of March 2005.

Upgrade to the new version of paFileDB (3.2 or later), when new version fixed this problem becomes available from the PHP Arena Web site at http://www.phparena.net/
Related URL (CVE)
Related URL 7183 (SecurityFocus)
Related URL 11613 (ISS)