Korean
<< Back
VID 21571
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpCOIN software is vulnerable to multiple SQL injection vulnerabilities. phpCOIN is a free software package originally designed for web-hosting resellers to handle clients, orders, invoices, notes and helpdesk. phpCOIN version 1.2.2 and earlier versions could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input to 'search' parameter of the 'index.php' script, the 'phpcoinsessid' parameter of the 'login.php' script and the 'id', 'dtopic_id', and 'dcat_id' parameters of the 'mod.php' script. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://archives.neohapsis.com/archives/bugtraq/2005-04/0499.html
http://digitalparadox.org/viewadvisories.ah?view=36

* Platforms Affected:
phpCOIN versions 1.2.2 and earlier
Any operating system Any version
Recommendation No upgrade or patch available as of May 2005

Upgrade to the latest version of phpCOIN (1.2.2 later), when new version fixed this problem becomes available from the phpCOIN Web site at http://www.phpcoin.com/index.php
Related URL CVE-2005-1384 (CVE)
Related URL 13433 (SecurityFocus)
Related URL 20308 (ISS)