ProNews Multiple Input Validation Vulnerabilities
BID:21516
Info
ProNews Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 21516 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 09 2006 12:00AM |
| Updated: | Dec 12 2006 09:18PM |
| Credit: | Mr_KaLiMaN is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
SCRIPTPHP ProNews 1.5 |
| Not Vulnerable: | |
Discussion
ProNews Multiple Input Validation Vulnerabilities
ProNews is prone to multiple input-validation vulnerabilities, including multiple HTML-injection issues, an SQL-injection issue, and a cross-site scripting issue, because the application fails to sufficiently sanitize user-supplied input.
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
ProNews version 1.5 is vulnerable to these issues.
ProNews is prone to multiple input-validation vulnerabilities, including multiple HTML-injection issues, an SQL-injection issue, and a cross-site scripting issue, because the application fails to sufficiently sanitize user-supplied input.
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
ProNews version 1.5 is vulnerable to these issues.
Exploit / POC
ProNews Multiple Input Validation Vulnerabilities
Attackers can exploit these issues via a web client.
The following proof-of-concept URIs are available:
HTML-injection:
http://www.example.com/[script_news_path]/admin/change.php?pseudo=[XSS]&email=">[XSS]&date=[XSS]&sujet=[XSS]&message=[XSS]&site=">[XSS]<foo
&lien=[XSS]&aa=[existing_news_id]
Cross-site scripting:
http://www.example.com/[script_news_path]/lire-avis.php?aa=[XSS]
SQL-injection:
http://www.example.com/[script_news_path]/lire-avis.php?aa=[SQL INJECTION]
Attackers can exploit these issues via a web client.
The following proof-of-concept URIs are available:
HTML-injection:
http://www.example.com/[script_news_path]/admin/change.php?pseudo=[XSS]&email=">[XSS]&date=[XSS]&sujet=[XSS]&message=[XSS]&site=">[XSS]<foo
&lien=[XSS]&aa=[existing_news_id]
Cross-site scripting:
http://www.example.com/[script_news_path]/lire-avis.php?aa=[XSS]
SQL-injection:
http://www.example.com/[script_news_path]/lire-avis.php?aa=[SQL INJECTION]
Solution / Fix
ProNews Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
References
ProNews Multiple Input Validation Vulnerabilities
References:
References:
- ProNews Homepage (SCRIPTPHP)
- ProNews V1.5 XSS & SQL Injection (Mr_KaLiMaN)