phpWordPress index.php Multiple Variable SQL Injection

2005-11-25T16:58:50
ID OSVDB:21110
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2005-11-25T16:58:50

Description

Vulnerability Description

phpWordPress contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the "poll", "category", and "ctg" variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, SpoonLabs has released a patch to address this vulnerability.

Short Description

phpWordPress contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the "poll", "category", and "ctg" variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

/index.php?poll=[SQL] /index.php?category=[SQL] /?archive&ctg=[SQL]

References:

Vendor URL: http://www.word-press.net/ Vendor Specific Solution URL: http://www.word-press.net/patches/v30-3011-patch.zip Vendor Specific News/Changelog Entry: http://forum.word-press.net/index.php?showtopic=76 Secunia Advisory ID:17733 Other Advisory URL: http://pridels.blogspot.com/2005/11/phpwordpress-30-sql-inj.html FrSIRT Advisory: ADV-2005-2594 CVE-2005-3844 Bugtraq ID: 15582