Future Internet Multiple Input Validation Vulnerabilities
BID:21727
Info
Future Internet Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 21727 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 23 2006 12:00AM |
| Updated: | Jan 02 2007 05:22PM |
| Credit: | Linux_Drox is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Future Internet Future Internet 0 |
| Not Vulnerable: | |
Discussion
Future Internet Multiple Input Validation Vulnerabilities
Future Internet is prone to multiple input-validation vulnerabilities, including cross-site scripting and SQL-injection issues, because it fails to sufficiently sanitize user-supplied input.
An attacker could exploit these issues to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Future Internet is prone to multiple input-validation vulnerabilities, including cross-site scripting and SQL-injection issues, because it fails to sufficiently sanitize user-supplied input.
An attacker could exploit these issues to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Exploit / POC
Future Internet Multiple Input Validation Vulnerabilities
An attacker can exploit the cross-site scripting issues by enticing an unsuspecting user to follow a malicious URI. An attacker can exploit the SQL-injection issue through a web-client.
The following proof-of-concept URIs are available:
http://www.example.com/path_of_script/index.cfm?fuseaction=Portal.Showpage&categoryid=311&newsId=[SQL]
http://www.example.com/path_of_script/index.cfm?fuseaction=Portal.Showpage&categoryid=[SQL]
http://www.example.com/path_of_script/index.cfm?langId=[SQL]
http://www.example.com/path_of_script/index.cfm?fuseaction=Portal.ShowPage&categoryId=[XSS]
An attacker can exploit the cross-site scripting issues by enticing an unsuspecting user to follow a malicious URI. An attacker can exploit the SQL-injection issue through a web-client.
The following proof-of-concept URIs are available:
http://www.example.com/path_of_script/index.cfm?fuseaction=Portal.Showpage&categoryid=311&newsId=[SQL]
http://www.example.com/path_of_script/index.cfm?fuseaction=Portal.Showpage&categoryid=[SQL]
http://www.example.com/path_of_script/index.cfm?langId=[SQL]
http://www.example.com/path_of_script/index.cfm?fuseaction=Portal.ShowPage&categoryId=[XSS]
Solution / Fix
Future Internet Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
References
Future Internet Multiple Input Validation Vulnerabilities
References:
References: