====================================================================== Secunia Research 14/06/2006 - CMS Mundo SQL Injection and File Upload Vulnerabilities - ====================================================================== Table of Contents Affected Software....................................................1 Severity.............................................................2 Description of Vulnerabilities.......................................3 Solution.............................................................4 Time Table...........................................................5 Credits..............................................................6 References...........................................................7 About Secunia........................................................8 Verification.........................................................9 ====================================================================== 1) Affected Software CMS Mundo 1.0 build 007 Prior versions may also be affected. Product Link: http://www.hotwebscripts.com/index.php?mod=webshop&function= showDetails&id=76 ====================================================================== 2) Severity Rating: Highly critical Impact: System access, manipulation of data Where: From remote ====================================================================== 3) Description of Vulnerabilities Secunia Research has discovered two vulnerabilities in CMS Mundo, which can be exploited by malicious people to conduct SQL injection attacks and compromise a vulnerable system. 1) Input passed to the "username" parameter in "controlpanel/" during login isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. This can further be exploited to bypass the authentication process and access the administration section (by e.g. providing "admin ' /*" as the username together with an empty password). Successful exploitation requires that "magic_quotes_gpc" is disabled. 2) An input validation error in the image upload handling in the image gallery can be exploited to upload arbitrary PHP scripts to a predictable location inside the web root. Successful exploitation requires access to the administration section. A combination of vulnerabilities #1 and #2 can be exploited by a malicious person to execute arbitrary PHP code on a vulnerable system. The vulnerabilities have been confirmed in version 1.0 build 007. Prior versions may also be affected. ====================================================================== 4) Solution Update to version 1.0 build 008. ====================================================================== 5) Time Table 30/05/2006 - Initial vendor notification. 30/05/2006 - Vendor confirms vulnerabilities. 14/06/2006 - Public disclosure. ====================================================================== 6) Credits Discovered by Andreas Sandblad, Secunia Research. ====================================================================== 7) References The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2006-2911 (SQL injection) and CVE-2006-2931 (arbitrary file upload) for the vulnerabilities. ====================================================================== 8) About Secunia Secunia collects, validates, assesses, and writes advisories regarding all the latest software vulnerabilities disclosed to the public. These advisories are gathered in a publicly available database at the Secunia website: http://secunia.com/ Secunia offers services to our customers enabling them to receive all relevant vulnerability information to their specific system configuration. Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/secunia_security_advisories/ ====================================================================== 9) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2006-43/advisory/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ======================================================================