The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


PhpList Sql Injection and Path Disclosure


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 28 Jul 2005 00:01:05 -0000
From: [email protected]
To: [email protected]
Subject: PhpList Sql Injection and Path Disclosure
X-Virus-Scanned: antivirus-gw at tyumen.ru

-----------------------------------------
PhpList Sql Injection and Path Disclosure

Vulnerabilities

1) There is an sql injection in the id parameter of public_html/lists/admin/?page=admin&id=INJECT HERE

2) Because of the heavy use of classes without proper checking of whether the script is directly called there is many path disclosures. The following pages are all affected under the preceding directory.

public_html/lists/admin:
about.php
connect.php
domainstats.php
usercheck.php

admin/commonlib/pages:
attributes.php
dbcheck.php
importcsv.php
user.php
usermgt.php
users.php

public_html/lists/admin/plugins:
helloworld.php
sidebar.php

public_html/lists/admin/plugsins/defaultplugin:
main.php

Solution

1) cleanse the id parameter before processing

2) check to see if the script is being directly called and then have the script die

Credit

[email protected]


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру