VNews admin/admin.php loginvar Variable SQL Injection

2006-03-29T04:34:37
ID OSVDB:24273
Type osvdb
Reporter Aliaksandr Hartsuyeu(alex@evuln.com)
Modified 2006-03-29T04:34:37

Description

Vulnerability Description

VNews contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the admin/admin.php script not properly sanitizing user-supplied input to the 'loginvar' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

VNews contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the admin/admin.php script not properly sanitizing user-supplied input to the 'loginvar' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://www.vscripts.pl/?id=vnews Secunia Advisory ID:19435 Related OSVDB ID: 24274 Related OSVDB ID: 24276 Related OSVDB ID: 24275 Other Advisory URL: http://evuln.com/vulns/112/summary.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0214.html Keyword: EV0112 ISS X-Force ID: 25529 FrSIRT Advisory: ADV-2006-1173 CVE-2006-1543 Bugtraq ID: 17316