SePortal 'goto' Parameter SQL Injection Vulnerability
BID:50995
Info
SePortal 'goto' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 50995 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 09 2011 12:00AM |
| Updated: | Dec 09 2011 12:00AM |
| Credit: | Don |
| Vulnerable: |
SePortal SePortal 2.5 |
| Not Vulnerable: | |
Discussion
SePortal 'goto' Parameter SQL Injection Vulnerability
SePortal is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit will allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
SePortal 2.5 is vulnerable; prior versions may also be affected.
SePortal is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit will allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
SePortal 2.5 is vulnerable; prior versions may also be affected.
Exploit / POC
SePortal 'goto' Parameter SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following example URL is available:
http://www.example.com/redirect.php?action=banner&goto=[SQL]
Attackers can use a browser to exploit this issue.
The following example URL is available:
http://www.example.com/redirect.php?action=banner&goto=[SQL]
Solution / Fix
SePortal 'goto' Parameter SQL Injection Vulnerability
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].