xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx # Ariko-Security: Security Audits , Audyt bezpieczenstwa # Advisory: 702/2010 ============ { Ariko-Security - Advisory #3/6/2010 } ============= XSS vulnerability and SQL injection in DPScms ALL versions Vendor's Description of Software: # http://www.dpscms.pl Dork: # N/A Application Info: # Name: DPScms # ALL versions Vulnerability Info: # Type: XSS, SQL injection Time Table: # 22/06/2010 - Vendor notified. Fix: # FIXED 29.06.2010 Input passed via the "q" parameter to index.php is not properly sanitised before being used in a SQL query. Input passed to the "q" parameter in index.php is not properly sanitised before being returned to the user. Solution: # Input validation of q parameter should be corrected. Vulnerability: # http://[site]/index.php?q=[SQLi] # http://[site]/index.php?q=[XSS] Credit: # Discoverd By: MG / Ariko-Security 2010 Advisory: # http://www.ariko-security.com/june2010/audyt_bezpieczenstwa_702.html