PHPKIT member.php Multiple Variable SQL Injection

2005-08-22T05:17:33
ID OSVDB:18951
Type osvdb
Reporter phuket(phuket.bugtraq@gmail.com)
Modified 2005-08-22T05:17:33

Description

Vulnerability Description

PHPKit contains a flaw that may allow a remote attacker to carry out an SQL injection attack. The issue is due to the 'member.php' script not properly sanitizing user-supplied input to the 'usernick' and 'letter' variables. This may allow a remote attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: Set the 'magic_quotes_gpc' PHP option to 'on'.

Short Description

PHPKit contains a flaw that may allow a remote attacker to carry out an SQL injection attack. The issue is due to the 'member.php' script not properly sanitizing user-supplied input to the 'usernick' and 'letter' variables. This may allow a remote attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

/phpkit/include.php?path=login/member.php&letter=phuket'%20AND%20MID(user_pw,1,1)='8'/*

References:

Vendor URL: http://www.phpkit.com Security Tracker: 1014778 Secunia Advisory ID:16531 Related OSVDB ID: 19092 Related OSVDB ID: 18952 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-08/0287.html CVE-2005-2683 Bugtraq ID: 14629