thinkWMS index.php Multiple Variable SQL Injection

2006-06-21T08:03:49
ID OSVDB:26742
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2006-06-21T08:03:49

Description

Vulnerability Description

ThinkWMS contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'id' and 'catid' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

ThinkWMS contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'id' and 'catid' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://www.thinkfactory.de/produkte/thinkWMS/ Security Tracker: 1016355 Secunia Advisory ID:20747 Related OSVDB ID: 26743 Other Advisory URL: http://pridels.blogspot.com/2006/06/thinkwms-sql-injection-vuln.html FrSIRT Advisory: ADV-2006-2470 CVE-2006-3236 Bugtraq ID: 18567