PHP Download Manager files.php cat Variable SQL Injection

2005-11-21T02:22:18
ID OSVDB:22827
Type osvdb
Reporter ksa_ksa82(ksa_ksa82@hotmail.com)
Modified 2005-11-21T02:22:18

Description

Vulnerability Description

PHP Download Manager contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the files.php script not properly sanitizing user-supplied input to the 'cat' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PHP Download Manager contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the files.php script not properly sanitizing user-supplied input to the 'cat' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/files.php?cat='&sort

References:

Vendor URL: http://webinteraktiv.create-now.net/ CVE-2005-3769 Bugtraq ID: 15517