Korean
<< Back
VID 21748
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpWebSite software is vulnerable to an SQL injection vulnerability in the 'search' module. phpWebSite provides an open-source based web site content management system (CMS) written in PHP. phpWebSite versions 0.10.2 and earlier could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the 'module' parameter of the 'search' module. If the magic_quotes_gpc option is disabled, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://sourceforge.net/mailarchive/forum.php?thread_id=8540340&forum_id=34704
http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/037936.html
http://www.phpwebsite.appstate.edu/index.php?module=announce&ANN_user_op=view&ANN_id=1034

* Platforms Affected:
Appalachian State University, phpWebSite versions 0.10.2 and earlier
Any Operating system Any version
Recommendation Upgrade to the latest version of phpWebSite (0.10.2 or later), available from the phpWebSite Web site at http://phpwebsite.appstate.edu/

-- OR --

Apply the latest phpWebSite patch for version 0.10.1 (phpwebsite_security_patch_20051012.tgz), available from the phpWebSite Web site at http://phpwebsite.appstate.edu/downloads/security/phpwebsite-security-patch-20051012.tgz
Related URL CVE-2005-4792 (CVE)
Related URL 15088 (SecurityFocus)
Related URL 22735 (ISS)