photokorn index.php Multiple Variable SQL Injection

2006-04-24T05:47:36
ID OSVDB:24981
Type osvdb
Reporter Dr.Jr7(dr.jr7@hotmail.com)
Modified 2006-04-24T05:47:36

Description

Vulnerability Description

Photokorn contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'index.php' script not properly sanitizing user-supplied input to the 'cat', 'pic' and 'page' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Photokorn contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'index.php' script not properly sanitizing user-supplied input to the 'cat', 'pic' and 'page' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/[path]/index.php?action=showgal&cat=[Sql] http://[target]/[path]/index.php?action=showpic&cat=1&pic=[Sql] http://[target]/[path]/index.php?action=showgal&cat=5&page=[Sql]

References:

Vendor URL: http://www.telekorn.com/cms/front_content.php Secunia Advisory ID:19836 Related OSVDB ID: 24982 Related OSVDB ID: 24983 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0514.html ISS X-Force ID: 26066 FrSIRT Advisory: ADV-2006-1525 CVE-2006-2040 Bugtraq ID: 17683