lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <004901cb2f6d$92868020$b7938060$@com>
Date: Fri, 30 Jul 2010 10:29:50 +1200
From: "Insomnia Security" <advisories@...omniasec.com>
To: <bugtraq@...urityfocus.com>
Subject: Insomnia : ISVA-100730.1 - CMS Multiple SQL injection Vulnerabilities

__________________________________________________________________

 Insomnia Security Vulnerability Advisory: ISVA-100730.1
___________________________________________________________________

 Name: EasyManage CMS Multiple SQL injection Vulnerabilities
 Released: 30 July 2010
  
 Vendor Link: 
    http://www.face.co.nz/easymanage
  
 Affected Products:
    Easy Manage CMS
     
 Original Advisory: 
    http://www.insomniasec.com/advisories/ISVA-100730.1.htm
 
 Researcher: 
    James Burton, Insomnia Security
    http://www.insomniasec.com
___________________________________________________________________

_______________

 Description
_______________

EasyManage Content Management System is a modular system designed
by New Zealand company, Face Limited.

It contains two modules which may be easily exploited to carry out
SQL injection attacks.

_______________

 Details
_______________

The vulnerable modules are cms_show_image.php and cms_show_download.php.
Both fail to filter the id paramater before using it in an SQL query.

The following error message is evident when id=1' is passed to
cms_show_image.php:

"Image select failed : You have an error in your SQL syntax;
check the manual that corresponds to your MySQL server version for the
right syntax to use near '\'' at line 1"

This generic form of SQL injection can be used to mine data from the 
database, and under certain configurations allow for unauthorised 
access to the CMS or underlying server.
      
_______________

 Solution
_______________

Face Limited were advised of this issue late June, and have released a 
patch to its hosted customers. Independant customers can obtain a patch
by contacting the vendor.

_______________

 Legals
_______________

The information is provided for research and educational purposes
only. Insomnia Security accepts no liability in any form whatsoever
for any direct or indirect damages associated with the use of this
information.
___________________________________________________________________
 
Insomnia Security Vulnerability Advisory: ISVA-100730.1
___________________________________________________________________

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ