Protector System Multiple Vulnerabilities
Date: Tuesday, April 27 @ 19:01:30 CEST
Topic: Modules


Janek Vind has reported some vulnerabilities in Protector System, allowing malicious people to conduct Cross Site Scripting, SQL injection and bypass the protection filters.

1) If error messages hasn't been turned off in PHP, the "blocker_query.php" script will return error messages if an invalid value is supplied to the "portNum" parameter. This can be exploited to reveal the installation path.

2) Input passed to the "target" and "portNum" parameters in the "blocker_query.php" script isn't properly verified before it is returned to the user. This can be exploited to execute arbitrary HTML or script code in a user's browser session in context of an affected site by tricking the user into visiting a malicious website or follow a specially crafted link.

3) Input passed in GET queries to PHP-Nuke isn't properly verified before it is used in an SQL insert query. This can be exploited by malicious people to manipulate SQL queries by injecting arbitrary SQL code.

4) It is possible to bypass the SQL injection filter system, by altering the injected SQL query using comments "/**/" in the command.

The vulnerabilities have been reported in version 1.15b1. Prior versions may also be affected.

Solution:
Use another product.

Provided and/or discovered by:
Janek Vind "waraxe"

http://secunia.com/advisories/11478/

How about improving it?



This article comes from NukeCops
http://www.nukecops.com

The URL for this story is:
http://www.nukecops.com/modules.php?name=News&file=article&sid=2005