PHP Planner SQL Injection Vulnerability , Discovered by N_A , N_A[at]tutanota.com ================================================================================= Description =========== This is a basic PHP Calendar with lots of features and possiblities. Uses mySQL as backend and is fitted with an account based system https://sourceforge.net/projects/phpplanner Vulnerability ============= An SQL Injection vulnerability is present within the register.php file of the package which results in arbitary command execution. register.php, snippet of vulnerable code: ========================================= if (isset($_POST['Submit'], $_POST['email'], $_POST['username'], $_POST['password'], $_POST['password2'], $_POST['name']) && IsEmailValid($_POST['email'])) { A A A A A A $SQL = mysql_query("SELECT * FROM cal_users WHERE username = '". $_POST['username'] ."' OR password = '". MD5($_POST['password']) ."' OR email = '". $_POST['email'] ."'"); As we can see the 'username','password' and 'email' variables are passed unchecked into the SQL query via the POST method. email ==> N_A[at]tutanota.com