__________________________________________________________________ Insomnia Security Vulnerability Advisory: ISVA-100730.1 ___________________________________________________________________ Name: EasyManage CMS Multiple SQL injection Vulnerabilities Released: 30 July 2010 Vendor Link: http://www.face.co.nz/easymanage Affected Products: Easy Manage CMS Original Advisory: http://www.insomniasec.com/advisories/ISVA-100730.1.htm Researcher: James Burton, Insomnia Security http://www.insomniasec.com ___________________________________________________________________ _______________ Description _______________ EasyManage Content Management System is a modular system designed by New Zealand company, Face Limited. It contains two modules which may be easily exploited to carry out SQL injection attacks. _______________ Details _______________ The vulnerable modules are cms_show_image.php and cms_show_download.php. Both fail to filter the id paramater before using it in an SQL query. The following error message is evident when id=1' is passed to cms_show_image.php: "Image select failed : You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1" This generic form of SQL injection can be used to mine data from the database, and under certain configurations allow for unauthorised access to the CMS or underlying server. _______________ Solution _______________ Face Limited were advised of this issue late June, and have released a patch to its hosted customers. Independant customers can obtain a patch by contacting the vendor. _______________ Legals _______________ The information is provided for research and educational purposes only. Insomnia Security accepts no liability in any form whatsoever for any direct or indirect damages associated with the use of this information. ___________________________________________________________________ Insomnia Security Vulnerability Advisory: ISVA-100730.1 ___________________________________________________________________