TankLogger livestock.php tank_id Variable SQL Injection

2006-01-11T00:00:00
ID OSVDB:22369
Type osvdb
Reporter Aliaksandr Hartsuyeu(alex@evuln.com)
Modified 2006-01-11T00:00:00

Description

Vulnerability Description

TankLogger contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the livestock.php script not properly sanitizing user-supplied input to the 'tank_id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

TankLogger contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the livestock.php script not properly sanitizing user-supplied input to the 'tank_id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/exp/tanklogger/showInfo.php?livestock_id=99'%20union%20select%201,2,3,4,5,6,7,8,9/*

References:

Vendor URL: http://tanklogger.sourceforge.net/ Secunia Advisory ID:18441 Related OSVDB ID: 22368 Other Advisory URL: http://www.evuln.com/vulns/26/summary.html Other Advisory URL: http://osvdb.org/ref/22/22369-tanklogger_vim.txt Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-01/0202.html Keyword: EV0026 ISS X-Force ID: 24080 FrSIRT Advisory: ADV-2006-0153 CVE-2006-0209 Bugtraq ID: 16228