Date: 22 Aug 2004 17:23:02 +0200
From: SecuriTeam <[email protected]>
To: [email protected]Subject: [UNIX] MyDMS SQL Injection and Directory Traversal Vulnerabilities
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
MyDMS SQL Injection and Directory Traversal Vulnerabilities
------------------------------------------------------------------------
SUMMARY
<http://dms.markuswestphal.de/about.html> MyDMS is an open-source
document-management-system based on PHP and MySQL published under the GPL.
MyDMS allows malicious users to view and download files via a directory
traversal bug and also allows remote attackers to insert arbitrary SQL
code.
DETAILS
Vulnerable Systems:
* MyDMS versions prior to 1.4.2
Immune Systems:
* MyDMS version 1.4.2 or newer (SQL injection vulnerability)
An SQL Injection vulnerability found in the file
/demo/out/out.ViewFolder.php. The parameter "FolderId" is not correctly
sanitized and an attacker can inject any SQL valid command. An example is
given below:
http://<host-with-mydmbs>/demo/out/out.ViewFolder.php?folderid=3 or 1=1as
Note: Using 1=1as makes the query fails but returns the complete SQL query
give to the database server.
The directory traversal bug is exploitable by registered users only but
allows them to view any file by inserting text such as the following to a
parameter:
./../../../../etc/passwd
This vulnerability is pretty straightforward and will allow an attacker to
gather a lot of information about the system that would allow better
degrees of creative attack to be performed.
Vendor Status:
The vendor has been contacted and the SQL injection vulnerability has been
fixed. However, the directory traversal bug is persistent even in the
newer version.
ADDITIONAL INFORMATION
The information has been provided by <mailto:[email protected]> Joxean
Koret.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: [email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.