Softbiz FAQ Script print_article.php id Variable SQL Injection

2005-11-28T08:48:42
ID OSVDB:21260
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2005-11-28T08:48:42

Description

Vulnerability Description

FAQ Script contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the print_article.php script not properly sanitizing user-supplied input to the 'id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

FAQ Script contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the print_article.php script not properly sanitizing user-supplied input to the 'id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

/print_article.php?id=[SQL]

References:

Vendor URL: http://www.softbizscripts.com/FAQ-script-features.php Secunia Advisory ID:17809 Related OSVDB ID: 21257 Related OSVDB ID: 21259 Related OSVDB ID: 21258 Related OSVDB ID: 21261 Packet Storm: http://packetstormsecurity.org/0511-advisories/sa17809.txt Other Advisory URL: http://pridels.blogspot.com/2005/11/softbiz-faq-script-multiple-sql-vuln.html ISS X-Force ID: 23296 CVE-2005-3938 Bugtraq ID: 15653