e107 upload.php Multiple Variable SQL Injection

2005-12-11T08:36:32
ID OSVDB:21659
Type osvdb
Reporter Yichen Xie(php-checker@glide.stanford.edu)
Modified 2005-12-11T08:36:32

Description

Vulnerability Description

e107 contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the upload.php script not properly sanitizing user-supplied input to the 'download_category' and 'file_demo' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

e107 contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the upload.php script not properly sanitizing user-supplied input to the 'download_category' and 'file_demo' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://e107.org/ Secunia Advisory ID:18023 Related OSVDB ID: 21657 Related OSVDB ID: 21658 Related OSVDB ID: 21660 Other Advisory URL: http://glide.stanford.edu/yichen/research/sec.pdf Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-12/0126.html Keyword: PHP-CHECKER CVE-2005-4224