SQL Injection Vulnerability in DSNewsletter

Summary

Vulnerability
SQL Injection Vulnerability in DSNewsletter
Discovered
2006.03.12
Last Update
2006.03.23 Exploitation code published
ID
EV0097
CVE
CVE-2006-1237
Risk Level
medium
Type
SQL Injection
Status
Unpatched. No reply from developer(s)
Vendor
n/a
Vulnerable Software
DSNewsletter (http://dsportal.uw.hu/)
Version
1.0
PoC/Exploit
Available
Solution
Not available
Discovered by
Aliaksandr Hartsuyeu (eVuln.com)

Description

SQL Injection found in DSNewsletter (http://dsportal.uw.hu/) script.

Vulnerable scripts:
include/sub.php
include/confirm.php
include/unconfirm.php


Variable $email isn't properly sanitized before being used in the SQL query. This can be used to make any SQL query by injecting arbitrary SQL code.

Condition: magic_quotes_gpc = off

PoC/Exploit

SQL Injection example:


<form action=http://[host]/dsnews/index.php?open=newsletter method=post>
<input name=email value="asd' union select 1,2,3,4,5/*">
<input name=choice value=sub>
<input type=submit name=submit value=Send>
</form>

Solution.

Solution for "SQL Injection Vulnerability in DSNewsletter" is not available. Check vendor's website for updates.