SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   ReviewPost PHP Pro Vendors:   All Enthusiast, Inc.
ReviewPost PHP Pro Input Validation Flaw Lets Remote Users Execute SQL Commands
SecurityTracker Alert ID:  1008941
SecurityTracker URL:  http://securitytracker.com/id/1008941
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 4 2004
Impact:   Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   G00db0y from Zone-h Security Labs reported an input validation vulnerability in ReviewPost PHP Pro. A remote user can inject SQL commands.

It is reported that some user-supplied data is not properly validated. A remote user can reportedly supply a specially crafted URL to execute SQL commands on the target system. Some demonstration exploit URLs are provided:

http://address/directory/showproduct.php?product=[query]

http://address/directory/showcat.php?cat=[query]

A remote user can obtain potentially sensitive information that may facilitate further attacks against the system, the report said.

Impact:   A remote user can execute SQL commands on the target system.
Solution:   The vendor has released a patch [user registration is required for the following URL]:

http://www.photopost.com/members/forum/showthread.php?s=&threadid=98098

Vendor URL:  www.reviewpost.com/indexpro.html (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  ZH2004-04SA (security advisory): Multiple Sql Injection Vulnerabilities


ZH2004-04SA (security advisory): Multiple Sql Injection Vulnerabilities in ReviewPost PHP Pro

Published: 04 february 2004

Released: 04 february 2004

Name: ReviewPost PHP Pro

Affected Systems: current and prior versions

Issue: Sql Injection Vulnerability

Author: G00db0y from Zone-h Security Labs - zetalabs@zone-h.org

Vendor: http://www.reviewpost.com




Description

***********

Zone-h Security Team has discovered a flaw in PhotoPost PHP Pro. There is a vulnerability 
in the current version (and also in prior versions) of PhotoPost PHP Pro that allows an 
attacker to disclose sensitive information that could be used to gain unauthorized access.
"Your community of users represents a wealth of knowledge. Now your users can help build 
and maintain your site by writing reviews of any product imaginable. With ReviewPost, you 
will quickly amass a valuable collection of user opinions about products that relate to 
your site."





Details

*******


The problems exist due to insufficient sanitization of user-supplied data. A remote 
attacker may exploit these issues to influence SQL query logic to disclose sensitive 
information that could be used to gain unauthorized access.

For example try this:

http://address/directory/showproduct.php?product=[query]

http://address/directory/showcat.php?cat=[query]




Solution:

*********

The vendor has been contacted and a patch was produced:

http://www.photopost.com/members/forum/showthread.php?s=&threadid=98098



G00db0y from Zone-h Security Labs - zetalabs@zone-h.org




http://www.zone-h.org/en/advisories/read/id=3864/



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC