phpMyFAQ password.php user Field SQL Injection

2005-09-22T05:55:15
ID OSVDB:19666
Type osvdb
Reporter rgod(retrogod@aliceposta.it)
Modified 2005-09-22T05:55:15

Description

Vulnerability Description

phpMyFAQ contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the password.php script not properly sanitizing user-supplied input to the user: field. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Upgrade to version 1.5.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

phpMyFAQ contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the password.php script not properly sanitizing user-supplied input to the user: field. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://www.phpmyfaq.de/ Vendor URL: http://www.phpmyfaq.de/advisory_2005-09-23.php Vendor Specific News/Changelog Entry: http://www.phpmyfaq.de/changelog.php Security Tracker: 1014968 Secunia Advisory ID:16933 Related OSVDB ID: 19670 Related OSVDB ID: 19671 Related OSVDB ID: 19667 Related OSVDB ID: 19668 Related OSVDB ID: 19672 Related OSVDB ID: 19669 Other Advisory URL: http://rgod.altervista.org/phpmyfuck151.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-09/0282.html CVE-2005-3046