AndoNET Blog index.php entrada Variable SQL Injection

2006-01-25T02:48:19
ID OSVDB:22755
Type osvdb
Reporter Aliaksandr Hartsuyeu(alex@evuln.com)
Modified 2006-01-25T02:48:19

Description

Vulnerability Description

AndoNet Blog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'entrada' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

AndoNet Blog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'entrada' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/adonet/index.php? ando=comentarios&entrada=1'% 20union%20select% 201,2,3,4/*

References:

Vendor URL: http://www.andonet.tk/ Secunia Advisory ID:18633 Packet Storm: http://packetstormsecurity.org/0601-advisories/sa18633.txt Packet Storm: http://packetstormsecurity.org/0601-advisories/AndoNET-2004.09.02.txt Other Advisory URL: http://evuln.com/vulns/50/ Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-01/0429.html Keyword: EV0050 ISS X-Force ID: 24309 FrSIRT Advisory: ADV-2006-0327 CVE-2006-0462 Bugtraq ID: 16393