exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CMSmadesimple-sql.txt

CMSmadesimple-sql.txt
Posted May 3, 2007
Authored by Daniel Lucq | Site scanit.be

CMS Made Simple version 1.05 is susceptible to a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | e738af64f8d980e5b68b264308728a14da5a690aba0b0207f657b9c11a441998

CMSmadesimple-sql.txt

Change Mirror Download
1) Summary

Affected software CMS Made Simple 1.05
Vendor URL http://www.cmsmadesimple.org/
Severity High

2) Vulnerability Description

The affected software is vulnerable to SQL injection via the templateid
parameter of the stylesheet.php page (the value of this parameter is
used directly in an SQL query, without any form of escaping or sanitation).

This vulnerability is remotely exploitable, and does not require
authentication prior to remote exploitation (since the page is normally
part of the publicly accessible part of the package).

The impact is dependent on the database back-end type (and the subset of
the SQL language supported by this back-end). E.g. a MySQL 5 back-end
will allow disclosure of the CMS usernames (including administrators)
and their password hashes.

3) Verification

http://www.example.com/stylesheet.php?templateid=16+AND+1=1
http://www.example.com/stylesheet.php?templateid=16+AND+1=0

4) Solution

Update to version 1.06 of the affected software.

5) Time Table

2007/04/24 Vendor was informed
2007/04/24 Vendor releases version 1.06 which fixes the issue
2007/05/02 Scanit publishes advisory

6) Additional Information

The original advisory can be found here:
http://www.scanit.be/advisory-2007-05-02.html

7) About Scanit

Scanit is a security company located in Brussels, Belgium. We specialise
in security assessments, offering services such as penetration tests,
application source code reviews, and risk assessments. More information
can be found at http://www.scanit.be/.

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close