PostNuke Message Module readpmsg.php Start Variable SQL Injection

2005-05-20T11:01:41
ID OSVDB:16781
Type osvdb
Reporter Maksymilian Arciemowicz(max@jestsuper.pl)
Modified 2005-05-20T11:01:41

Description

Vulnerability Description

PostNuke contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the "start" variable in the " /modules/Messages/readpmsg.php" script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.

Solution Description

Upgrade to version 0.750b or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

PostNuke contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the "start" variable in the " /modules/Messages/readpmsg.php" script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.

Manual Testing Notes

http://[victim]/[DIR]/modules.php?op=modload&name=Messages&file=readpmsg&start=0%20UNION%20SELECT%20pn_uname,null,pn_uname,pn_pass,pn_pass,null,pn_pass,null%20FROM%20pn_users%20WHERE%20pn_uid=2/*&total_messages=1

References:

Vendor URL: http://www.postnuke.com/ Security Tracker: 1014066 Secunia Advisory ID:15450 Other Advisory URL: http://news.postnuke.com/Article2691.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-05/0313.html Generic Exploit URL: http://www.milw0rm.org/id.php?id=1030 CVE-2005-1777