[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: Re: PHP-Fusion v6.00.109 SQL Injection / admin|users credentials
From: security curmudgeon <jericho () attrition ! org>
Date: 2005-09-30 9:54:17
Message-ID: Pine.LNX.4.63.0509300551230.26802 () forced ! attrition ! org
[Download RAW message or body]
: I believe that this thing has been discovered and fixed long time ago.
: check this out, maybe I am wrong:
: http://www.gnucitizen.org/writings/php-fusion-messages.php-sql-injection-vulnerability.xhtml
Your advisory:
POST fields pm_email_notify and pm_save_sent are not properly sanitized.
Rgod's advisory:
msg_send=' UNION SELECT [..]
BID 14489 / OSVDB 18708:
msg_view='
So three advisories or points of disclosure, 4 different variables, all in
messages.php it seems. Close, but this seems like a different issue.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic