Protector System Multiple Vulnerabilities
Date: Tuesday, April 27 @ 19:01:30 CEST Topic: Modules
Janek Vind has reported some vulnerabilities in Protector System, allowing
malicious people to conduct Cross Site Scripting, SQL injection and bypass the
protection filters.
1) If error messages hasn't been turned off in PHP,
the "blocker_query.php" script will return error messages if an invalid value is
supplied to the "portNum" parameter. This can be exploited to reveal the
installation path.
2) Input passed to the "target" and "portNum"
parameters in the "blocker_query.php" script isn't properly verified before it
is returned to the user. This can be exploited to execute arbitrary HTML or
script code in a user's browser session in context of an affected site by
tricking the user into visiting a malicious website or follow a specially
crafted link.
3) Input passed in GET queries to PHP-Nuke isn't properly
verified before it is used in an SQL insert query. This can be exploited by
malicious people to manipulate SQL queries by injecting arbitrary SQL
code.
4) It is possible to bypass the SQL injection filter system, by
altering the injected SQL query using comments "/**/" in the command.
The vulnerabilities have been reported in version 1.15b1. Prior versions may
also be affected.
Solution: Use another
product.
Provided and/or discovered by: Janek Vind "waraxe"
http://secunia.com/advisories/11478/
How about improving it?
|
|