PHP Labs Top Auction search.php SQL Injection

2005-11-23T11:56:33
ID OSVDB:21106
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2005-11-23T11:56:33

Description

Vulnerability Description

Top Auction contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the search.php script not properly sanitizing user-supplied input to the "searchterm" variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Additionally, if a failed query is performed, the program will disclose the software's installation path. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Top Auction contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the search.php script not properly sanitizing user-supplied input to the "searchterm" variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Additionally, if a failed query is performed, the program will disclose the software's installation path. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.

Manual Testing Notes

http://[target]/search.php?searchterm=[SQL]

References:

Vendor URL: http://www.phplabs.com/ Secunia Advisory ID:17687 Related OSVDB ID: 21107 Related OSVDB ID: 21105 Other Advisory URL: http://pridels.blogspot.com/2005/11/top-auction-multiple-sql-vuln.html CVE-2005-3952