[UNIX] Postnuke Subjects Module SQL Injection Vulnerability

From: SecuriTeam (support_at_securiteam.com)
Date: 09/14/04

  • Next message: SecuriTeam: "[NT] F-Secure Internet Gatekeeper Content Scanning Server DoS"
    To: list@securiteam.com
    Date: 14 Sep 2004 14:21:28 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      Postnuke Subjects Module SQL Injection Vulnerability
    ------------------------------------------------------------------------

    SUMMARY

    The <http://home.postnuke.ru> Subjects "Module is designed for structured
    store & display text content with a possibility to store content in file
    on the disc. Probably, the best one for converting existing based on HTML
    pages site to PostNuke."

    Several SQL injection attacks are possible through several variables
    passed to the module's code.

    DETAILS

    Vulnerable Systems:
     * Postnuke Subjects module version 2.0

    The vulnerable parameters are pageid, subid and catid which are passed
    directly to the SQL statement thus paving the way for an easily
    exploitable SQL injection vulnerability. Examples are shown below:
      /index.php?module=subjects&func=listpages&subid=[SQL]
      /index.php?module=subjects&func=viewpage&pageid=[SQL]
      /index.php?module=subjects&func=listcat&catid=[SQL]

    Workaround
    The only known workaround as of this time is to remove the module from the
    system due to the critical nature of the vulnerability in question.

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:security@criolabs.net>
    Criolabs.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[NT] F-Secure Internet Gatekeeper Content Scanning Server DoS"

    Relevant Pages

    • [UNIX] PHPNuke Multiple Vulnerabilities in Search Module
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... cross-site scripting and SQL injections located throughout the ... The vulnerability exists in the ... The first SQL injection vulnerability is a non-critical one in the ...
      (Securiteam)
    • [UNIX] Trend Micro VirusWall Buffer Overflow in VSAPI Library
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... buffer overflow vulnerability in VSAPI library allows arbitrary code ... is called "vscan" which is set suid root by default. ... permissions and thus granted all local users the privilege to execute the ...
      (Securiteam)
    • [UNIX] SCO Multiple Local Buffer Overflow
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Local exploitation of a buffer overflow vulnerability in the ppp binary, ... allows attackers to gain root privileges. ...
      (Securiteam)
    • [NT] Microsoft Word 6.0/95 Document Converter Buffer Overflow (MS04-041)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... WordPad is "a word processing application that uses the MFC rich edit ... Remote exploitation of a buffer overflow vulnerability in Microsoft ... Microsoft Word format files into the Rich Text Format natively handled by ...
      (Securiteam)
    • [UNIX] Tikiwiki Command Injection and Arbitrary File Exposure Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Two security vulnerabilities have been recently discovered in Tikiwiki, ... Remote exploitation of an input validation vulnerability in Tikiwiki ... allows attackers to gain access to arbitrary files on the vulnerable ...
      (Securiteam)