SilverNews login.php username Field SQL Injection

2005-08-03T04:23:15
ID OSVDB:18517
Type osvdb
Reporter rgod(retrogod@aliceposta.it)
Modified 2005-08-03T04:23:15

Description

Vulnerability Description

SilverNews contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the "login.php" script not properly sanitizing user-supplied input to the username field. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: Enable "magic_quotes_gpc" PHP option.

Short Description

SilverNews contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the "login.php" script not properly sanitizing user-supplied input to the username field. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

user: ' or isnull(1/0) /* pass: whatever

References:

Vendor URL: http://www.silver-scripts.de/scripts.php?l=en&script=SilverNews Security Tracker: 1014622 Secunia Advisory ID:16315 Other Advisory URL: http://www.rgod.altervista.org/silvernews.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-08/0045.html ISS X-Force ID: 21688 CVE-2005-2478 Bugtraq ID: 14466