The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] ADOdb SQL Injection and PHP Code Execution Vulnerabilities


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 11 Jan 2006 09:52:52 +0200
Subject: [UNIX] ADOdb SQL Injection and PHP Code Execution Vulnerabilities
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060111082702.7C73158BD@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  ADOdb SQL Injection and PHP Code Execution Vulnerabilities
------------------------------------------------------------------------


SUMMARY

" <http://adodb.sourceforge.net/>; ADOdb is a database abstraction library 
for PHP."

Two vulnerabilities in ADOdb can be exploited by malicious attackers to 
disclose system information, execute arbitrary PHP code, execute arbitrary 
SQL code, and potentially compromise a vulnerable system.

DETAILS

Vulnerable Systems:
 * ADOdb version 4.66
 * ADOdb version 4.68

Immune Systems:
 * ADOdb version 4.70

SQL Injection:
The problem is caused due to the presence of the insecure "server.php" 
test script. This can be exploited to execute arbitrary SQL code with full 
MySQL database privileges via the "sql" parameter.

Proof of Concept:
http://[victim]/server.php?sql=SELECT '[content]' INTO OUTFILE '[file]'

This can further be exploited to create an arbitrary PHP script in a 
directory inside the web root writable by the MySQL user. Successful 
exploitation requires that the MySQL password for the root user is empty 
and that the affected script is placed accessible inside the web root.

Code Execution:
The problem is caused due to the presence of the insecure 
"tests/tmssql.php" test script. This can be exploited to call an arbitrary 
PHP function via the "do" parameter.

Proof of Concept:
http://[victim]/tests/tmssql.php?do=phpinfo

Successful exploitation requires that the affected script is placed 
accessible inside the web root.

Disclosure Timeline:
30/12/2005 - Initial vendor notification.
03/01/2006 - Other affected vendors notified.
05/01/2006 - Initial vendor reply.
08/01/2006 - New version of ADOdb released.
09/01/2006 - Public disclosure.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:vuln@secunia.com.> Secunia 
Research.
The original article can be found at:  
<http://secunia.com/secunia_research/2005-64/advisory/>; 
http://secunia.com/secunia_research/2005-64/advisory/




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру