Secunia Security Advisory - AmnPardaz Security Research Team have reported a vulnerability in Carbon Communities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
5e869d4480e7a745e49f41308663ccb1141ab1864d481fbf765e3236e7061c5d
----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
14 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
Learn more / Download (instant access):
http://secunia.com/network_software_inspector_2/
----------------------------------------------------------------------
TITLE:
Carbon Communities Cross-Site Scripting and SQL Injection
SECUNIA ADVISORY ID:
SA29827
VERIFY ADVISORY:
http://secunia.com/advisories/29827/
CRITICAL:
Moderately critical
IMPACT:
Cross Site Scripting, Manipulation of data
WHERE:
>From remote
SOFTWARE:
Carbon Communities 2.x
http://secunia.com/product/18421/
DESCRIPTION:
AmnPardaz Security Research Team have reported a vulnerability in
Carbon Communities, which can be exploited by malicious people to
conduct cross-site scripting and SQL injection attacks.
1) Input passed to the "Redirect" parameter in login.asp and to the
"OrderBy" parameter in member_send.asp is not properly sanitised
before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.
2) Input passed to the "ID" parameter in events.asp and to the
"UserName" parameter in getpassword.asp is not properly sanitised
before being used in SQL queries. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.
The vulnerabilities are reported in version 2.4. Other versions may
also be affected.
SOLUTION:
Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY:
AmnPardaz Security Research Team
ORIGINAL ADVISORY:
http://bugreport.ir/index.php?/35
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------