W-Agora Multiple Input Validation Vulnerabilities
BID:23057
Info
W-Agora Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 23057 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1607 CVE-2007-1605 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 20 2007 12:00AM |
| Updated: | Jul 06 2016 02:39PM |
| Credit: | laurent gaffié is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
W-Agora W-Agora 4.2.1 |
| Not Vulnerable: | |
Discussion
W-Agora Multiple Input Validation Vulnerabilities
w-Agora is prone to multiple input-validation vulnerabilities, including possible SQL-injection issues and multiple cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
w-Agora 4.2.1 is vulnerable.
w-Agora is prone to multiple input-validation vulnerabilities, including possible SQL-injection issues and multiple cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
w-Agora 4.2.1 is vulnerable.
Exploit / POC
W-Agora Multiple Input Validation Vulnerabilities
An attacker can exploit an SQL-injection vulnerability via a browser. To exploit a cross-site scripting vulnerability, the attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URIs are available:
http://www.example.com/w-agora/search.php?bn=hello_hello&gosearch=1&pattern=1&search_date=0&search_fields[body]=1&search_fields[
subject]=1&search_forum='[sql]
http://www.example.com/w-agora/search.php?bn=hello_hello&gosearch=1&pattern=1&search_date=0&search_fields[body]=1&search_fields[
subject]=1&search_forum=hello_hello&search_mode=0&search_user='[sql]
An attacker can exploit an SQL-injection vulnerability via a browser. To exploit a cross-site scripting vulnerability, the attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URIs are available:
http://www.example.com/w-agora/search.php?bn=hello_hello&gosearch=1&pattern=1&search_date=0&search_fields[body]=1&search_fields[
subject]=1&search_forum='[sql]
http://www.example.com/w-agora/search.php?bn=hello_hello&gosearch=1&pattern=1&search_date=0&search_fields[body]=1&search_fields[
subject]=1&search_forum=hello_hello&search_mode=0&search_user='[sql]
Solution / Fix
W-Agora Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
W-Agora Multiple Input Validation Vulnerabilities
References:
References: