Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:10083
HistoryNov 01, 2005 - 12:00 a.m.

[SA17378] Subdreamer Login SQL Injection Vulnerabilities

2005-11-0100:00:00
vulners.com
15

TITLE:
Subdreamer Login SQL Injection Vulnerabilities

SECUNIA ADVISORY ID:
SA17378

VERIFY ADVISORY:
http://secunia.com/advisories/17378/

CRITICAL:
Highly critical

IMPACT:
Manipulation of data, System access, Security Bypass

WHERE:
>From remote

SOFTWARE:
Subdreamer 2.x
http://secunia.com/product/6014/

DESCRIPTION:
RST/GHC has reported some vulnerabilities in Subdreamer, which can be
exploited by malicious people to conduct SQL injection attacks and
compromise a vulnerable system.

Some input passed when logging in isn't properly sanitised before
being used in a SQL query. This can be exploited to manipulate SQL
queries by injecting arbitrary SQL code.

This can further be exploited to access the administration section
where arbitrary PHP files can be uploaded and executed via the Image
Manager panel.

The vulnerabilities have been reported in version 2.2.1. Other
versions may also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
RST/GHC

ORIGINAL ADVISORY:
http://rst.void.ru/papers/advisory35.txt


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.