Softbiz Image Gallery template.php provided Variable SQL Injection

2006-03-31T05:17:36
ID OSVDB:24369
Type osvdb
Reporter Linux_Drox(Xx_HacK_xX_2004@HotMail.com)
Modified 2006-03-31T05:17:36

Description

Vulnerability Description

Softbiz Image Gallery contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the template.php script not properly sanitizing user-supplied input to the 'provided' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Softbiz Image Gallery contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the template.php script not properly sanitizing user-supplied input to the 'provided' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/imagegallery/template.php?provided=[SQL]

References:

Vendor URL: http://www.softbizscripts.com/ Secunia Advisory ID:19523 Related OSVDB ID: 24371 Related OSVDB ID: 24368 Related OSVDB ID: 24370 Related OSVDB ID: 24372 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0033.html CVE-2006-1659 Bugtraq ID: 17339