PHP-Post profile.php Multiple Variable SQL Injection

2006-09-16T12:18:55
ID OSVDB:28967
Type osvdb
Reporter HACKERS PAL(security@soqor.net)
Modified 2006-09-16T12:18:55

Description

Vulnerability Description

PHP-Post contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the profile.php script not properly sanitizing user-supplied input to the 'user' and 'table_prefix' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PHP-Post contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the profile.php script not properly sanitizing user-supplied input to the 'user' and 'table_prefix' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

/profile.php?table_prefix=myprefix:)%20where%201=1/ /profile.php?user='%20union%20select%20usernumber,7,7,username,7,7,7,7,7,7,username,7,userpassword,7,7,7,7,7,7,7,7%20from%20phpp_users%20where%20usernumber=1/

References:

Vendor URL: http://www.php-post.co.uk/ Secunia Advisory ID:22014 Related OSVDB ID: 28968 Related OSVDB ID: 28965 Related OSVDB ID: 28973 Related OSVDB ID: 28964 Related OSVDB ID: 28966 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0290.html ISS X-Force ID: 29018 FrSIRT Advisory: ADV-2006-3688 CVE-2006-4877 CVE-2006-4879 Bugtraq ID: 20061