SQL Injection and XSS Vulnerabilities in MWNewsletter
Summary
- Vulnerability
 - SQL Injection and XSS Vulnerabilities in MWNewsletter
 - Discovered
 - 2006.04.06
 - Last Update
 - 2006.04.16 Exploitation code published
 - ID
 - EV0123
 - CVE
 - CVE-2006-1690 CVE-2006-1691 CVE-2006-1692
 - Risk Level
 - medium
 - Type
 - Multiple Vulnerabilities
 - Status
 - Unpatched. No reply from developer(s)
 - Vendor
 - Manic Web
 - Vulnerable Software
 - MWNewsletter (http://www.manicweb.co.uk/)
 - Version
 - 1.0.0b
 - PoC/Exploit
 - Available
 - Solution
 - Not available
 - Discovered by
 - Aliaksandr Hartsuyeu (eVuln.com)
 
Description
Multiple Vulnerabilities found in MWNewsletter (http://www.manicweb.co.uk/) script.
1. SQL Injection.
Vulnerable script: unsubscribe.php
Parameter user_name is not properly sanitized before being used in SQL query. This can be used to make any SQL query by injecting arbitrary SQL code.
Condition: magic_quotes_gpc = off
2. Cross-Site Scripting.
Vulnerable Script: subscribe.php
Parameter user_name is not properly sanitized. This can be used to post arbitrary HTML or web script code.
PoC/Exploit
1. SQL Injection Example:
URL: http://[host]mwnewsletter/unsubscribe.php
Name: ' or 1/*
2. Cross-Site Scripting Example:
URL: http://[host]mwnewsletter/subscribe.php
Name: [XSS]
Solution.
Solution for "SQL Injection and XSS Vulnerabilities in MWNewsletter" is not available. Check Manic Web website for updates.
