Korean
<< Back
VID 21693
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The paFileDB program is vulnerable to an SQL injection vulnerability in the /includes/admin/auth.php script. paFileDB is a Web-based file download management program developed by PHP Arena that uses a MySQL database. paFileDB version 3.1 and possibly other versions could allow a remote attacker to execute arbitrary SQL commands via the username value in the pafiledbcookie cookie. If the magic_quotes_gpc option is disabled and $authmethod="cookies" is used, a remote attacker could send a specially-crafted cookie to the /includes/admin/auth.php script, which would allow the attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://www.security-project.org/projects/board/showthread.php?t=947
http://secunia.com/advisories/16566/
http://marc.theaimsgroup.com/?l=bugtraq&m=112490781927680&w=2

* Platforms Affected:
PHP Arena, paFileDB version 3.1 and possibly other versions
Any operating system Any version
Recommendation No upgrade or patch available as of June 2014.

As a workaround, edit $authmethod in pafiledb.php to disable cookie-based authentication.
Related URL CVE-2005-2723 (CVE)
Related URL 14654 (SecurityFocus)
Related URL 21988 (ISS)