Aardvark Topsites PHP index.php Multiple Variable SQL Injection

2003-12-16T00:00:00
ID OSVDB:3379
Type osvdb
Reporter JeiAr(jeiar@gulftech.org)
Modified 2003-12-16T00:00:00

Description

Vulnerability Description

Aardvark Topsites PHP contains a SQL injection attack that allows a remote attacker to add, modify or delete information in the backend database. User supplied input to index.php is not filtered before being used in the SQL query.

Solution Description

Upgrade to version 4.1.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Aardvark Topsites PHP contains a SQL injection attack that allows a remote attacker to add, modify or delete information in the backend database. User supplied input to index.php is not filtered before being used in the SQL query.

Manual Testing Notes

Tampering with SQL queries is possible via the "id" and "session_id" variables in index.php You can test if you are vulnerable by accessing the url below.

http://topsitelocation/index.php?a=lostpw&set=1&id=http://topsitelocation/index.php?a=lostpw&set=1&session_id=

References:

Vendor URL: http://www.aardvarkind.com Secunia Advisory ID:10453 Other Advisory URL: http://archives.neohapsis.com/archives/bugtraq/2003-12/0240.html Other Advisory URL: http://www.gulftech.org/12162003b.php Nessus Plugin ID:11957 ISS X-Force ID: 14022 Bugtraq ID: 9231