PhpGedView placelist.php SQL Injection

2004-01-12T00:00:00
ID OSVDB:3463
Type osvdb
Reporter OSVDB
Modified 2004-01-12T00:00:00

Description

Vulnerability Description

PhpGedView contains a a flaw which allows a SQL injection attack. User supplied input to placelist.php is not filtered before being used in the SQL query. A remote attacker can exploit this flaw to add, modify or delete information in the backend database.

Solution Description

Upgrade to version 2.65 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

PhpGedView contains a a flaw which allows a SQL injection attack. User supplied input to placelist.php is not filtered before being used in the SQL query. A remote attacker can exploit this flaw to add, modify or delete information in the backend database.

Manual Testing Notes

/placelist.php?level=1[Evil_Query] /placelist.php?level=1&parent[0]=[Evil_Query] /placelist.php?level=2&parent[0]=&parent[1]=[Evil_Query]

References:

Vendor URL: http://sourceforge.net/project/showfiles.php?group_id=55456 Vendor URL: http://phpgedview.sourceforge.net/ Secunia Advisory ID:10602 Other Advisory URL: http://www.gulftech.org/01132004.php Mail List Post: http://marc.theaimsgroup.com/?l=bugtraq&m=107394912715478&w=2 ISS X-Force ID: 14205 CVE-2004-0065