eFiction authors.php let Variable SQL Injection

2005-11-25T08:33:38
ID OSVDB:21119
Type osvdb
Reporter rgod(retrogod@aliceposta.it)
Modified 2005-11-25T08:33:38

Description

Vulnerability Description

eFiction contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the authors.php script not properly sanitizing user-supplied input to the 'let' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

eFiction contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the authors.php script not properly sanitizing user-supplied input to the 'let' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/[path]/authors.php?action=viewlist&let='%20UNION%20SELECT%20password,0%20FROM%20fanfiction_authors/ http://[target]/[path]/authors.php?action=viewlist&let=%27%20UNION%20SELECT%20password,password%20FROM%20efiction_fanfiction_authors/&offset=0,40/*

References:

Vendor URL: http://www.efiction.wallflowergirl.com/index.php Security Tracker: 1015273 Secunia Advisory ID:17777 Related OSVDB ID: 21122 Related OSVDB ID: 21118 Related OSVDB ID: 21125 Related OSVDB ID: 21120 Related OSVDB ID: 21121 Related OSVDB ID: 21123 Related OSVDB ID: 21124 Related OSVDB ID: 21126 Other Advisory URL: http://rgod.altervista.org/efiction2_xpl.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-11/0301.html