MySQL Eventum login.php email Variable SQL Injection Authentication Bypass

2005-07-31T04:51:48
ID OSVDB:18403
Type osvdb
Reporter James Bercegay()
Modified 2005-07-31T04:51:48

Description

Vulnerability Description

MySQL Eventum contains a flaw that may allow a remote attacker to carry out an SQL injection attack and bypass authentication settings. The issue is due to the 'login.php' script not properly sanitizing user-supplied input to the 'email' variable. This may allow a remote attacker to inject or manipulate SQL queries in the backend database to bypass authentication.

Solution Description

Upgrade to version 1.6.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

MySQL Eventum contains a flaw that may allow a remote attacker to carry out an SQL injection attack and bypass authentication settings. The issue is due to the 'login.php' script not properly sanitizing user-supplied input to the 'email' variable. This may allow a remote attacker to inject or manipulate SQL queries in the backend database to bypass authentication.

References:

Vendor URL: http://dev.mysql.com/downloads/other/eventum/ Vendor Specific News/Changelog Entry: http://lists.mysql.com/eventum-users/2072 Security Tracker: 1014603 Secunia Advisory ID:16304 Related OSVDB ID: 18400 Related OSVDB ID: 18405 Related OSVDB ID: 18406 Related OSVDB ID: 18402 Related OSVDB ID: 18401 Related OSVDB ID: 18404 Other Advisory URL: http://www.gulftech.org/?node=research&article_id=00093-07312005 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-08/0014.html ISS X-Force ID: 21640 FrSIRT Advisory: ADV-2005-1287 CVE-2005-2468 Bugtraq ID: 14437