VID |
21748 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The phpWebSite software is vulnerable to an SQL injection vulnerability in the 'search' module. phpWebSite provides an open-source based web site content management system (CMS) written in PHP. phpWebSite versions 0.10.2 and earlier could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the 'module' parameter of the 'search' module. If the magic_quotes_gpc option is disabled, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://sourceforge.net/mailarchive/forum.php?thread_id=8540340&forum_id=34704 http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/037936.html http://www.phpwebsite.appstate.edu/index.php?module=announce&ANN_user_op=view&ANN_id=1034
* Platforms Affected: Appalachian State University, phpWebSite versions 0.10.2 and earlier Any Operating system Any version |
Recommendation |
Upgrade to the latest version of phpWebSite (0.10.2 or later), available from the phpWebSite Web site at http://phpwebsite.appstate.edu/
-- OR --
Apply the latest phpWebSite patch for version 0.10.1 (phpwebsite_security_patch_20051012.tgz), available from the phpWebSite Web site at http://phpwebsite.appstate.edu/downloads/security/phpwebsite-security-patch-20051012.tgz |
Related URL |
CVE-2005-4792 (CVE) |
Related URL |
15088 (SecurityFocus) |
Related URL |
22735 (ISS) |
|