@1 File Store control/users/edit.php id Variable SQL Injection

2006-03-11T15:47:37
ID OSVDB:23856
Type osvdb
Reporter Aliaksandr Hartsuyeu(alex@evuln.com)
Modified 2006-03-11T15:47:37

Description

Vulnerability Description

@1 File Store contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the control/users/edit.php script not properly sanitizing user-supplied input to the 'id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

@1 File Store contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the control/users/edit.php script not properly sanitizing user-supplied input to the 'id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://www.upoint.info/cgi/download/ Security Tracker: 1015826 Secunia Advisory ID:19224 Related OSVDB ID: 23850 Related OSVDB ID: 23852 Related OSVDB ID: 23859 Related OSVDB ID: 23860 Related OSVDB ID: 23861 Related OSVDB ID: 23864 Related OSVDB ID: 23851 Related OSVDB ID: 23857 Related OSVDB ID: 23858 Related OSVDB ID: 23862 Related OSVDB ID: 23863 Related OSVDB ID: 23853 Related OSVDB ID: 23854 Related OSVDB ID: 23855 Other Advisory URL: http://evuln.com/vulns/95/summary.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-03/0458.html Keyword: EV0095 FrSIRT Advisory: ADV-2006-0943 CVE-2006-1278 Bugtraq ID: 17090