php-revista articulo.php id_articulo Variable SQL Injection

2006-09-01T05:34:21
ID OSVDB:28448
Type osvdb
Reporter SirDarckCat(sirdarckcat@gmail.com)
Modified 2006-09-01T05:34:21

Description

Vulnerability Description

php-revista contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'articulo.php' script not properly sanitizing user-supplied input to the 'id_articulo' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

php-revista contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'articulo.php' script not properly sanitizing user-supplied input to the 'id_articulo' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/estilo/[ANY STYLE]/articulo.php?id_articulo=-1+[SQL]

References:

Vendor URL: http://php-revista.sourceforge.org/ Secunia Advisory ID:21738 Related OSVDB ID: 28443 Related OSVDB ID: 28445 Related OSVDB ID: 28446 Related OSVDB ID: 28449 Related OSVDB ID: 28450 Related OSVDB ID: 28451 Related OSVDB ID: 28452 Related OSVDB ID: 28447 Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-09/0017.html CVE-2006-4606 Bugtraq ID: 19818