The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] MyDMS SQL Injection and Directory Traversal Vulnerabilities


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 22 Aug 2004 17:23:02 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [UNIX] MyDMS SQL Injection and Directory Traversal Vulnerabilities

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  MyDMS SQL Injection and Directory Traversal Vulnerabilities
------------------------------------------------------------------------


SUMMARY

 <http://dms.markuswestphal.de/about.html>; MyDMS is an open-source 
document-management-system based on PHP and MySQL published under the GPL.

MyDMS allows malicious users to view and download files via a directory 
traversal bug and also allows remote attackers to insert arbitrary SQL 
code.

DETAILS

Vulnerable Systems:
 * MyDMS versions prior to 1.4.2

Immune Systems:
 * MyDMS version 1.4.2 or newer (SQL injection vulnerability)

An SQL Injection vulnerability found in the file 
/demo/out/out.ViewFolder.php. The parameter "FolderId" is not correctly 
sanitized and an attacker can inject any SQL valid command. An example is 
given below:
http://<;host-with-mydmbs>/demo/out/out.ViewFolder.php?folderid=3 or 1=1as

Note: Using 1=1as makes the query fails but returns the complete SQL query 
give to the database server.

The directory traversal bug is exploitable by registered users only but 
allows them to view any file by inserting text such as the following to a 
parameter:
./../../../../etc/passwd

This vulnerability is pretty straightforward and will allow an attacker to 
gather a lot of information about the system that would allow better 
degrees of creative attack to be performed.

Vendor Status:
The vendor has been contacted and the SQL injection vulnerability has been 
fixed. However, the directory traversal bug is persistent even in the 
newer version.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> Joxean 
Koret.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру