The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] CMS Mundo SQL Injection and File Upload Vulnerabilities


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 30 Aug 2006 15:14:00 +0200
Subject: [UNIX] CMS Mundo SQL Injection and File Upload Vulnerabilities
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060830131258.10E4F574F@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  CMS Mundo SQL Injection and File Upload Vulnerabilities
------------------------------------------------------------------------


SUMMARY

Secunia Research has discovered two vulnerabilities in CMS Mundo, which 
can be exploited by malicious people to conduct SQL injection attacks and 
compromise a vulnerable system.

DETAILS

Vulnerable Systems:
 * CMS Mundo version 1.0 build 007

Immune Systems:
 * CMS Mundo version 1.0 build 008

1) Input passed to the "username" parameter in "controlpanel/" during 
login isn't properly sanitised before being used in a
SQL query. This can be exploited to manipulate SQL queries by injecting 
arbitrary SQL code.

This can further be exploited to bypass the authentication process and 
access the administration section (by e.g. providing
"admin ' /*" as the username together with an empty password).

Successful exploitation requires that "magic_quotes_gpc" is disabled.

2) An input validation error in the image upload handling in the image 
gallery can be exploited to upload arbitrary PHP scripts to a predictable 
location inside the web root.

Successful exploitation requires access to the administration section.

A combination of vulnerabilities #1 and #2 can be exploited by a malicious 
person to execute arbitrary PHP code on a vulnerable system.

The vulnerabilities have been confirmed in version 1.0 build 007. Prior 
versions may also be affected.

Solution:
Update to version 1.0 build 008.

Time Table:
30/05/2006 - Initial vendor notification.
30/05/2006 - Vendor confirms vulnerabilities.
14/06/2006 - Public disclosure.

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2911>; 
CVE-2006-2911,
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2931>; 
CVE-2006-2931


ADDITIONAL INFORMATION

The information has been provided by  <mailto:vuln-remove@secunia.com.> 
Secunia Research.
The original article can be found at:  
<http://secunia.com/secunia_research/2006-43/advisory/>; 
http://secunia.com/secunia_research/2006-43/advisory/




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру