SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   PhotoPost PHP Pro Vendors:   All Enthusiast, Inc.
PhotoPost PHP Pro Input Validation Flaw Lets Remote Users Execute SQL Commands
SecurityTracker Alert ID:  1008902
SecurityTracker URL:  http://securitytracker.com/id/1008902
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 2 2004
Impact:   Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 4.6 and prior versions
Description:   G00db0y from Zone-h Security Labs reported an input validation vulnerability in PhotoPost PHP Pro. A remote user can inject SQL commands.

It is reported that some user-supplied data is not properly validated. A remote user can reportedly supply a specially crafted URL to execute SQL commands on the target system. A demonstration exploit URL is provided:

http://address/directory/showphoto.php?photo=[query]

A remote user can obtain potentially sensitive information that may facilitate further attacks against the system, the report said.

Impact:   A remote user can execute SQL commands on the target system.
Solution:   The vendor has released a patch [user registration is required for the following URL]:

http://www.photopost.com/members/forum/showthread.php?s=&threadid=98113

Vendor URL:  www.photopost.com/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  ZH2004-03SA (security advisory): Photopost PHP Pro 4.6 Sql Injection


ZH2004-03SA (security advisory): Photopost PHP Pro 4.6 Sql Injection Vulnerability

Published: 02 february 2004

Released: 02 february 2004

Name: Photopost PHP Pro

Affected Systems: 4.6 and prior versions

Issue: Sql Injection Vulnerability

Author: G00db0y from Zone-h Security Labs - zetalabs@zone-h.org

Vendor: http://www.photopost.com




Description

***********

Zone-h Security Team has discovered a flaw in PhotoPost PHP Pro. There is a vulnerability 
in the current version (and also in prior versions) of PhotoPost PHP Pro that allows an 
attacker to disclose sensitive information that could be used to gain unauthorized access.
"PhotoPost PHP Pro lets your users upload and discuss photos in galleries that you create 
as well as public and private albums that they create, and it integrates seamlessly into 
your current site design. PhotoPost PHP Pro can
even use your existing forum login system (if you have one) to keep your users from having 
to register twice, and our complete forum integration option lets you display your 
PhotoPost albums and photos inside your vBulletin or UBB Threads forum"




Details

*******


The problems exist due to insufficient sanitization of user-supplied data. A remote 
attacker may exploit these issues to influence SQL query logic to disclose sensitive 
information that could be used to gain unauthorized access.

For example try this:

http://address/directory/showphoto.php?photo=[query]




Solution:

*********

The vendor has been contacted and a patch was produced:


http://www.photopost.com/members/forum/showthread.php?s=&threadid=98113



G00db0y from Zone-h Security Labs - zetalabs@zone-h.org



http://www.zone-h.org/en/advisories/read/id=3844/



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC