[Full-Disclosure] SQL Injection Vulnerability in FuzzyMonkey MyClassifieds SQL Version
From: Sintelli SINTRAQ (sintraq_at_sintelli.com)
To: <email@example.com>, <firstname.lastname@example.org> Date: Tue, 21 Oct 2003 17:01:44 +0100
SQL Injection Vulnerability in FuzzyMonkey MyClassifieds SQL Version
18 October 2003
My Classifieds SQL is a Perl/CGI/MySQL script which will quickly and easily
allow the hosting of a classifieds forum on a website.
More information about the product is available here:
MyClassifieds SQL Version is vulnerable to a SQL injection attack. The
problem is due to improper sanitization of user input for the $email
variable. A remote attacker could insert arbitrary SQL code in the $email
variable. The passwords of the users can be written into a file and made
If the value of $email is email@example.com' OR 1=1 INTO OUTFILE
'/<directory-path>/pass.txt, the SQL request becomes:
select passmd5 from people where email=' firstname.lastname@example.org' OR 1=1 INTO OUTFILE
and the passwords of the users can be written into the file pass.txt.
It is possible for an attacker to obtain passwords of users.
Upgrade to version 2.13
15 Oct 2003 Identified by Ezhilan of Sintelli
15 Oct 2003 Issue disclosed to FuzzyMonkey (Erin)
16 Oct 2003 Vulnerability confirmed by Erin
18 Oct 2003 Fix available
18 Oct 2003 Sintelli confirms vulnerability has been addressed
18 Oct 2003 Sintelli Public Disclosure
Ezhilan of Sintelli discovered this vulnerability.
Sintelli is the world's largest provider of security intelligence solutions.
Sintelli is the definitive source for IT Security intelligence and is a
provider of third generation intelligence security solutions.
Request a free trial of our alerting solution by clicking here
Copyright 2003 Sintelli Limited. All rights reserved. www.sintelli.com
Full-Disclosure - We believe in it.