SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   PHP Support Tickets Vendors:   Triangle Solutions Ltd.
PHP Support Tickets Input Validation Holes Let Remote Users Inject SQL Commands and Bypass Authentication
SecurityTracker Alert ID:  1015352
SecurityTracker URL:  http://securitytracker.com/id/1015352
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 13 2005
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.0
Description:   A vulnerability was reported in PHP Support Tickets. A remote user can inject SQL commands.

The software does not properly validate user-supplied input in the 'username' and 'password' fields of the login page and in the 'id' parameter of the 'index.php' script. A remote user can supply specially crafted parameter values to execute SQL commands on the underlying database. This can be exploited to bypass authentication and gain administrative access on the target application.

Network Intelligence India reported this vulnerability.

The original advisory is available at:

http://www.nii.co.in/vuln/PHPSupportTickets.html

Impact:   A remote user can execute SQL commands on the underlying database.

A remote user can gain administrative access to the target application.

Solution:   The vendor has issued a fix, available at:

http://www.phpsupporttickets.com/

Vendor URL:  www.phpsupporttickets.com/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC