The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Xoops SQL fragment disclosure and SQL injection vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 29 Jan 2002 17:03:32 +0100
From: =?iso-8859-1?Q?Cabezon_Aur=E9lien?= <[email protected]>
To: [email protected]
Subject: Xoops SQL fragment disclosure and SQL injection vulnerability
Cc: [email protected]

-- [ Xoops SQL fragment disclose and SQL injection vulnerability ] --

Discovered on 27/01/2002
Vendor: http://xoops.sourceforge.net

-- [ Overview ] --

XOOPS is an open source portal script written extensively in object-oriented
PHP. Backed with MySQL Database.
There is 2 security issues :

- Xoops disclose SQL query.
- Xoops allow remote user to SQL query injection.

-- [ Description ] --

The userinfo.php script does not check for special meta-characters in user's
inputs

It is possible to make it crash using this kind of query :
http://xoops-site/userinfo.php?uid=1;

then it gives you this error report :

-snip-
MySQL Query Error: SELECT u.*, s.* FROM x_users u, x_users_status s WHERE
u.uid=1; AND u.uid=s.uid
Error number:1064
Error message: You have an error in your SQL syntax near '; AND u.uid=s.uid'
at line 1
ERROR
-snip-

It dicloses many informations that help to SQL injection attack...
Such as http://xoops-site/userinfo.php?uid=1&#091;SQL Query]

More about SQL injection
http://www.owasp.org/projects/asac/iv-sqlinjection.shtml

No exploit is given, but it was successfully tested.
Xoops team has been alerted.

-- [ Tested Version ] --

Xoops RC1

-- [ Discovered by ] --

Cabezon Aurelien | [email protected]
http://www.iSecureLabs.com | French Security portal

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру