Oi! Email Marketing System Login Username Field SQL Injection

2006-02-23T06:02:36
ID OSVDB:23462
Type osvdb
Reporter Illuminatus(illuminatus85@gmail.com), h4cky0u(h4cky0u@gmail.com)
Modified 2006-02-23T06:02:36

Description

Vulnerability Description

Oi! Email Marketing System contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'index.php' script not properly sanitizing user-supplied input to the 'username' input field in the login screen. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Oi! Email Marketing System contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'index.php' script not properly sanitizing user-supplied input to the 'username' input field in the login screen. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://www.miro.com.au/ Secunia Advisory ID:18993 Other Advisory URL: http://www.h4cky0u.org/advisories/HYSA-2006-003-oi-email.txt Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0591.html FrSIRT Advisory: ADV-2006-0718 CVE-2006-0919