[UNIX] Postnuke Subjects Module SQL Injection Vulnerability
From: SecuriTeam (support_at_securiteam.com)
To: email@example.com Date: 14 Sep 2004 14:21:28 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Postnuke Subjects Module SQL Injection Vulnerability
The <http://home.postnuke.ru> Subjects "Module is designed for structured
store & display text content with a possibility to store content in file
on the disc. Probably, the best one for converting existing based on HTML
pages site to PostNuke."
Several SQL injection attacks are possible through several variables
passed to the module's code.
* Postnuke Subjects module version 2.0
The vulnerable parameters are pageid, subid and catid which are passed
directly to the SQL statement thus paving the way for an easily
exploitable SQL injection vulnerability. Examples are shown below:
The only known workaround as of this time is to remove the module from the
system due to the critical nature of the vulnerability in question.
The information has been provided by <mailto:firstname.lastname@example.org>
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.