Korean
<< Back
VID 21915
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Pixelpost program is vulnerable to multiple SQL injection vulnerabilities which exist in versions 1-5rc1-2 and earlier. Pixelpost is a photo BLOG application based on PHP and MySQL. Pixelpost versions 1-5rc1-2 and earlier are vulnerable to multiple SQL injection vulnerabilities, caused by improper filtering of user-supplied input passed to the category and archivedate parameters of the index.php script. If PHP's 'magic_quotes_gpc' setting is disabled, these vulnerabilities could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://forum.pixelpost.org/showthread.php?t=4331
http://www.securityfocus.com/archive/1/435856/30/60/threaded
http://retrogod.altervista.org/pixelpost_15rc12_xpl.html
http://securitytracker.com/id?1016217
http://www.milw0rm.com/exploits/1868

* Platforms Affected:
Pixelpost versions 1-5rc1-2 and earlier
Any operating system Any version
Recommendation Apply the patches as listed in the Pixelpost Forum Web site at http://forum.pixelpost.org/showthread.php?t=4331

-- OR --

Upgrade to a version of Pixelpost greater than 1-5rc1-2, when new fixed version becomes available from the Pixelpost Web site at http://www.pixelpost.org/
Related URL CVE-2006-2889,CVE-2006-2890 (CVE)
Related URL 18276 (SecurityFocus)
Related URL (ISS)