SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   CMS Mundo Vendors:   hotwebscripts.com
CMS Mundo Input Validation Flaw Lets Remote Users Inject SQL Commands and Remote Authenticated Administrators Upload Arbitrary Code
SecurityTracker Alert ID:  1016311
SecurityTracker URL:  http://securitytracker.com/id/1016311
CVE Reference:   CVE-2006-2911, CVE-2006-2931   (Links to External Site)
Date:  Jun 15 2006
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.0 build 007
Description:   A vulnerability was reported in CMS Mundo. A remote user can include and execute arbitrary code on the target system. A remote user can inject SQL commands.

The image upload function does not properly validate user-supplied files. A remote authenticated administrator can upload arbitrary PHP code and then have the web server invoke the file to execute the arbitrary code. The PHP code, including operating system commands, will run with the privileges of the target web service.

The 'controlpanel' script does not properly validate user-supplied input in the 'username' parameter during login. If 'magic_quotes_gpc' is disabled, a remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database. This can be exploited to bypass authentication and gain administrative access to the target application.

The vendor was notified on May 30, 2006.

Andreas Sandblad of Secunia Research discovered these vulnerabilities.

Impact:   A remote user can execute arbitrary PHP code and operating system commands on the target system with the privileges of the target web service.

A remote user can execute SQL commands on the underlying database.

Solution:   No solution was available at the time of this entry.
Vendor URL:  www.hotwebscripts.com/index.php?mod=webshop&function=showDetails&id=76 (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  Secunia Research: CMS Mundo SQL Injection and File Upload

======================================================================

                     Secunia Research 14/06/2006

     - CMS Mundo SQL Injection and File Upload Vulnerabilities -

======================================================================
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerabilities.......................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

======================================================================
1) Affected Software

CMS Mundo 1.0 build 007

Prior versions may also be affected.

Product Link:
http://www.hotwebscripts.com/index.php?mod=webshop&function=
showDetails&id=76

======================================================================
2) Severity

Rating: Highly critical
Impact: System access, manipulation of data
Where:  From remote

======================================================================
3) Description of Vulnerabilities

Secunia Research has discovered two vulnerabilities in CMS Mundo, 
which can be exploited by malicious people to conduct SQL injection 
attacks and compromise a vulnerable system.

1) Input passed to the "username" parameter in "controlpanel/" 
during login isn't properly sanitised before being used in a 
SQL query. This can be exploited to manipulate SQL queries by 
injecting arbitrary SQL code.

This can further be exploited to bypass the authentication process 
and access the administration section (by e.g. providing 
"admin ' /*" as the username together with an empty password).

Successful exploitation requires that "magic_quotes_gpc" is disabled.

2) An input validation error in the image upload handling in the 
image gallery can be exploited to upload arbitrary PHP scripts to a 
predictable location inside the web root.

Successful exploitation requires access to the administration section.

A combination of vulnerabilities #1 and #2 can be exploited by a 
malicious person to execute arbitrary PHP code on a vulnerable system.

The vulnerabilities have been confirmed in version 1.0 build 007. 
Prior versions may also be affected.

======================================================================
4) Solution

Update to version 1.0 build 008.

======================================================================
5) Time Table

30/05/2006 - Initial vendor notification.
30/05/2006 - Vendor confirms vulnerabilities.
14/06/2006 - Public disclosure.

======================================================================
6) Credits

Discovered by Andreas Sandblad, Secunia Research.

======================================================================
7) References

The Common Vulnerabilities and Exposures (CVE) project has assigned 
CVE-2006-2911 (SQL injection) and 
CVE-2006-2931 (arbitrary file upload) for the vulnerabilities.

======================================================================
8) About Secunia

Secunia collects, validates, assesses, and writes advisories regarding
all the latest software vulnerabilities disclosed to the public. These
advisories are gathered in a publicly available database at the
Secunia website:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all
relevant vulnerability information to their specific system
configuration.

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

======================================================================
9) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-43/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC