phphd check.php username Variable POST Method SQL Injection

2006-02-04T07:17:53
ID OSVDB:23025
Type osvdb
Reporter Aliaksandr Hartsuyeu(alex@evuln.com)
Modified 2006-02-04T07:17:53

Description

Vulnerability Description

phphd contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the checkphp script not properly sanitizing user-supplied input to the 'username' variable via the POST method. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

phphd contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the checkphp script not properly sanitizing user-supplied input to the 'username' variable via the POST method. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://www.hintondesign.org/ Secunia Advisory ID:18793 Related OSVDB ID: 23027 Related OSVDB ID: 23028 Related OSVDB ID: 23026 Other Advisory URL: http://evuln.com/vulns/60/summary.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-02/0171.html Keyword: EV0060 ISS X-Force ID: 24508 CVE-2006-0608