aWebNews visview.php _GET['cid'] Variable SQL Injection

2006-04-01T07:17:40
ID OSVDB:24336
Type osvdb
Reporter Aliaksandr Hartsuyeu(alex@evuln.com)
Modified 2006-04-01T07:17:40

Description

Vulnerability Description

aWebNews contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the visview.php script not properly sanitizing user-supplied input to the _GET['cid'] variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

aWebNews contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the visview.php script not properly sanitizing user-supplied input to the _GET['cid'] variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://labs.aweb.com.au/awebnews.php Secunia Advisory ID:19487 Related OSVDB ID: 24334 Related OSVDB ID: 24335 Related OSVDB ID: 24333 Other Advisory URL: http://evuln.com/vulns/116/summary.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0273.html Keyword: EV0116 FrSIRT Advisory: ADV-2006-1196 CVE-2006-1613