lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1741952578.139507.1345214164002.JavaMail.open-xchange@email.1and1.fr>
Date: Fri, 17 Aug 2012 16:36:03 +0200 (CEST)
From: HTTPCS <contact@...pcs.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Cc: submit@...sec.com, vuln@...unia.com
Subject: [HTTPCS] w-agora 4.2.1 Multiple
	Vulnerabilities(SQLI, XSS)

HTTPCS Advisory : HTTPCS79
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'pattern' parameter to '/users.php' is not properly sanitised before being
used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /users.php
Variables : pattern=[VulnHTTPCS]
Type : SQLI
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs79
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________
HTTPCS Advisory : HTTPCS80
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'att_id' parameter to '/getfile.php' is not properly sanitised before being
used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /getfile.php
Variables : att_id=[VulnHTTPCS]
Type : SQLI
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs80
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________
HTTPCS Advisory : HTTPCS81
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'search_user' parameter to '/search.php' is not properly sanitised before
being used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /search.php
Variables : search_user=[VulnHTTPCS]
Type : SQLI
Method : POST
Solution :
References : https://www.httpcs.com/advisory/httpcs81
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________
HTTPCS Advisory : HTTPCS82
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'search_forum' parameter to '/search.php' is not properly sanitised before
being used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /search.php
Variables : search_forum=[VulnHTTPCS]
Type : SQLI
ethod : POST
Solution :
References : https://www.httpcs.com/advisory/httpcs82
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________
HTTPCS Advisory : HTTPCS78
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Less Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'full' parameter to '/users.php' is not properly sanitised before
being returned to the user. This can be exploited to execute arbitrary HTML and
script code in a user's browser session in context of an affected site.
Page : /users.php
Variables : full=[VulnHTTPCS]
Type : XSS
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs78
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________
HTTPCS Advisory : HTTPCS77
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Less Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'att_id' parameter to '/getfile.php' is not properly sanitised
before being returned to the user. This can be exploited to execute arbitrary
HTML and script code in a user's browser session in context of an affected site.
Page : /getfile.php
Variables : att_id=[VulnHTTPCS]
Type : XSS
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs77
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________

Twitter : http://twitter.com/HTTPCS_
Advisories : https://www.httpcs.com/advisories
Free web vulnerability scanner HTTPCS
_______________________________________________
Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ