PortailPhp mod_forum/read_message.php id Variable SQL Injection

2005-08-04T17:49:31
ID OSVDB:18685
Type osvdb
Reporter abducter(abducter_minds@yahoo.com)
Modified 2005-08-04T17:49:31

Description

Vulnerability Description

PortailPHP contains a flaw that may allow a remote attacker to carry out an SQL injection attack. The issue is due to the 'read_message.php' script not properly sanitizing user-supplied input to the 'id' variable. This may allow a remote attacker to inject or manipulate SQL queries in the backend database.

Technical Description

According to the advisory, it has been reported that the affected version is 2.4. However, the latest release is version 1.3.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PortailPHP contains a flaw that may allow a remote attacker to carry out an SQL injection attack. The issue is due to the 'read_message.php' script not properly sanitizing user-supplied input to the 'id' variable. This may allow a remote attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/portailphp/index.php?affiche=Forum-read_mess&id='

References:

Vendor URL: http://www.safari-msi.com/portailphp/index.php Other Advisory URL: http://nvd.nist.gov/nvd.cfm?cvename=CAN-2005-2486 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-08/0101.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-08/0058.html CVE-2005-2486 Bugtraq ID: 14474