PDFdirectory util.php Multiple Variable SQL Injection

2006-01-09T09:42:15
ID OSVDB:22403
Type osvdb
Reporter OSVDB
Modified 2006-01-09T09:42:15

Description

Vulnerability Description

PDFdirectory contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the util.php script not properly sanitizing user-supplied input to the 'id' or 'owner' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Upgrade to version 1.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

PDFdirectory contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the util.php script not properly sanitizing user-supplied input to the 'id' or 'owner' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://pdfdirectory.sourceforge.net/ Vendor Specific News/Changelog Entry: http://sourceforge.net/project/shownotes.php?group_id=122682&release_id=382411 Vendor Specific News/Changelog Entry: http://cvs.sourceforge.net/viewcvs.py/pdfdirectory/pdfdirectory/includes/util.php?r1=1.4&r2=1.5 Secunia Advisory ID:18459 Related OSVDB ID: 22405 Related OSVDB ID: 22406 Related OSVDB ID: 22402 Related OSVDB ID: 22410 Related OSVDB ID: 22412 Related OSVDB ID: 22404 Related OSVDB ID: 22407 Related OSVDB ID: 22409 Related OSVDB ID: 22411 Related OSVDB ID: 22413 Related OSVDB ID: 22408 Related OSVDB ID: 22414 Related OSVDB ID: 22415 Mail List Post: http://archives.neohapsis.com/archives/apps/freshmeat/2006-01/0008.html FrSIRT Advisory: ADV-2006-0231 CVE-2006-0313 Bugtraq ID: 16273