SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   L-Forum Vendors:   l-forum.sourceforge.net
L-Forum Bulletin Board Input Validation Bug in 'search.php' Allows Remote Users to Inject SQL Commands
SecurityTracker Alert ID:  1005044
SecurityTracker URL:  http://securitytracker.com/id/1005044
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Aug 14 2002
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  

Description:   An input validation vulnerability was reported in the L-Forum software. A remote user could execute arbitrary SQL commands on the underlying database server.

It is reported that the 'search.php' code does not properly filter or escape user-supplied SQL data. A remote user can submit a specially crafted search to execute arbitrary SQL commands on the system.

A demonstration exploit for Postgres is provided:

http://localhost/search.php?search=a%27%20order%20by%20time%20desc%3b%20[query]

A demonstration exploit for MySQL is provided:

http://localhost/search.php?search=a%25%27%20order%20by%20time%20desc%3b%20[query]

Impact:   A remote user can execute arbitrary SQL commands on the underlying database server.
Solution:   The author of the report has submitted a patch, available at:

http://sourceforge.net/tracker/download.php?group_id=53716&atid=471341&file_id=29026&aid=594867

Vendor URL:  l-forum.x-php.net/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [VulnWatch] L-Forum Vulnerability - SQL Injection


I have discovered an SQL injection flaw in L-Forum which has
a recent record (upload spoofing/XSS by Ulf) of security bugs.

The problem this time is search.php.  It doesn't properly escape
the SQL data passed in by the user in the search member.  I
have provided a SourceForge patch for this vulnerability.  I
have shown URLs that exploit this:

Postgres:

http://localhost/search.php?search=a%27%20order%20by%20time%20desc%3b%20[que
ry]

MySQL:

http://localhost/search.php?search=a%25%27%20order%20by%20time%20desc%3b%20[
query]

I've patched this on SourceForge:

http://sourceforge.net/tracker/download.php?group_id=53716&atid=471341&file_
id=29026&aid=594867

"The reason the mainstream is thought
of as a stream is because it is
so shallow."
                     - Author Unknown



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC