Secunia Security Advisory - Mustafa Can Bjorn has discovered two vulnerability in Pentacle In-Out Board, which can be exploited by malicious people to conduct SQL injection attacks.
41117db342f35fb21b8b82a68921a137b129903c4e6a05671b97236735e5152f
TITLE:
Pentacle In-Out Board SQL Injection Vulnerabilities
SECUNIA ADVISORY ID:
SA19024
VERIFY ADVISORY:
http://secunia.com/advisories/19024/
CRITICAL:
Moderately critical
IMPACT:
Manipulation of data
WHERE:
>From remote
SOFTWARE:
Pentacle In-Out Board 6.x
http://secunia.com/product/8358/
DESCRIPTION:
Mustafa Can Bjorn has discovered two vulnerability in Pentacle In-Out
Board, which can be exploited by malicious people to conduct SQL
injection attacks.
Input passed to the "username" and "userpassword" parameters in
login.asp and to the "newsid" parameter in newsdetails.asp isn't
properly sanitised before being used in a SQL query. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation allows bypassing of authentication.
The vulnerability has been confirmed in version 6.03.0.0080. Other
versions may also be affected.
SOLUTION:
Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY:
Mustafa Can Bjorn
ORIGINAL ADVISORY:
http://www.nukedx.com/?viewdoc=13
http://www.nukedx.com/?viewdoc=14
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------