Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Web Server/CGI)  >   AdCycle Vendors:
AdCycle Banner Rotation Software Fails to Properly Filter User-Supplied Input and Allows Remote Users to Execute SQL Commands on the Database
SecurityTracker Alert ID:  1003054
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 25 2001
Impact:   Execution of arbitrary code via network, Modification of user information, User access via network

Description:   GOBBLES Labs reported an input validation flaw in AdCycle, a perl-based banner advertisement rotation program. The program does not filter user-supplied input in some cases, allowing a remote user to perform SQL injection attacks against the underlying MySQL database.

It is reported possible for a remote user to create URLs that can cause SQL commands to be executed by the underlying SQL database.

The vendor has reportedly been notified.

Impact:   A remote user can execute SQL commands on the underlying SQL server.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (NT), Windows (95), Windows (98)

Message History:   None.

 Source Message Contents

Date:  Tue, 25 Dec 2001 23:10:56 GMT




AdCycle is ad rotating software written in Perl language, which uses DBI
with mysql driver to access database. 

AdCycle constructs a very many SQL statement with data taken straight from
untrusted source. Although in many case it use DBI quote(), it still
possible in other cases to perform SQL injection attacks against AdCycle
software to manipulate the server's database. 


We notified the vendor about 40 minutes ago. No time to tap feet waiting.
This is marathon. 


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, LLC