PHP Address Book Multiple SQL Injection and Multiple Cross Site Scripting Vulnerabilities
BID:52396
Info
PHP Address Book Multiple SQL Injection and Multiple Cross Site Scripting Vulnerabilities
| Bugtraq ID: | 52396 |
| Class: | Input Validation Error |
| CVE: |
CVE-2012-1911 CVE-2012-1912 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 10 2012 12:00AM |
| Updated: | Mar 19 2015 07:35AM |
| Credit: | Stefan Schurtz |
| Vulnerable: |
PHP Address Book PHP Address Book 6.2.12 PHP Address Book PHP Address Book 7.0 |
| Not Vulnerable: | |
Discussion
PHP Address Book Multiple SQL Injection and Multiple Cross Site Scripting Vulnerabilities
PHP Address Book is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input.
Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PHP Address Book 6.2.12 is vulnerable; other versions may also be affected.
PHP Address Book is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input.
Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PHP Address Book 6.2.12 is vulnerable; other versions may also be affected.
Exploit / POC
PHP Address Book Multiple SQL Injection and Multiple Cross Site Scripting Vulnerabilities
Attackers can use a browser to exploit the SQL-injection issues. An attacker must trick a victim into following a malicious URI to exploit a cross-site scripting issue.
The following example URIs are available:
http://www.example.com/addressbook/edit.php?id=[sql-injection]
http://www.example.com/addressbook/group.php?add=Add to&group=1&selected%5b%5d=132&to_group=[sql-injection]
http://www.example.com/addressbook/vcard.php?id=[sql-injection]
http://www.example.com/addressbook/preferences.php?from='"</script><script>alert(document.cookie)</script>
http://www.example.com/addressbook/index.php?group='"</script><script>alert(document.cookie)</script>
Attackers can use a browser to exploit the SQL-injection issues. An attacker must trick a victim into following a malicious URI to exploit a cross-site scripting issue.
The following example URIs are available:
http://www.example.com/addressbook/edit.php?id=[sql-injection]
http://www.example.com/addressbook/group.php?add=Add to&group=1&selected%5b%5d=132&to_group=[sql-injection]
http://www.example.com/addressbook/vcard.php?id=[sql-injection]
http://www.example.com/addressbook/preferences.php?from='"</script><script>alert(document.cookie)</script>
http://www.example.com/addressbook/index.php?group='"</script><script>alert(document.cookie)</script>
Solution / Fix
PHP Address Book Multiple SQL Injection and Multiple Cross Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
PHP Address Book Multiple SQL Injection and Multiple Cross Site Scripting Vulnerabilities
References:
References:
- PHP Address Book 7.0.0 Multiple security vulnerabilities (Stefan Schurtz)
- PHP Address Book Homepage (PHP Address Book)