PluggedOut Nexus search.php Multiple Variable SQL Injection

2005-12-06T15:29:10
ID OSVDB:21478
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2005-12-06T15:29:10

Description

Vulnerability Description

Nexus contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the search.php script not properly sanitizing user-supplied input to the 'firstname', 'lastname' and 'location' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Nexus contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the search.php script not properly sanitizing user-supplied input to the 'firstname', 'lastname' and 'location' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://www.pluggedout.com/index.php?pk=dev_nexus Secunia Advisory ID:17909 Related OSVDB ID: 21479 Other Advisory URL: http://pridels.blogspot.com/2005/12/pluggedout-nexus-sqlxss-vuln_06.html FrSIRT Advisory: ADV-2005-2751 CVE-2005-4056