[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060418195849.10146.qmail@securityfocus.com>
Date: 18 Apr 2006 19:58:49 -0000
From: alex@...ln.com
To: bugtraq@...urityfocus.com
Subject: [eVuln] MD News Authentication Bypass and SQL Injection
Vulnerabilities
New eVuln Advisory:
MD News Authentication Bypass and SQL Injection Vulnerabilities
http://evuln.com/vulns/120/summary.html
--------------------Summary----------------
eVuln ID: EV0120
Software: MD News
Sowtware's Web Site: http://www.matthewdingley.co.uk/
Versions: 1
Critical Level: Moderate
Type: Multiple Vulnerabilities
Class: Remote
Status: Unpatched. No reply from developer(s)
PoC/Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)
-----------------Description---------------
1. SQL Injection.
Vulnerable script: admin.php
Parameter id is not properly sanitized before being used in SQL query. This can be used to make any SQL query by injecting arbitrary SQL code.
2. Authentication Bypass.
"Administration Area" script has no any authentication. Any user can get access to administrator's area. (Just need to know script name)
--------------PoC/Exploit----------------------
Available at: http://evuln.com/vulns/120/exploit.html
--------------Solution---------------------
No Patch available.
--------------Credit-----------------------
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)
Regards,
Aliaksandr Hartsuyeu
http://evuln.com - Penetration Testing Services
.
Powered by blists - more mailing lists