Full Disclosure mailing list archives
[HTTPCS] w-agora 4.2.1 Multiple Vulnerabilities(SQLI, XSS)
From: HTTPCS <contact () httpcs com>
Date: Fri, 17 Aug 2012 16:36:03 +0200 (CEST)
HTTPCS Advisory : HTTPCS79 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'pattern' parameter to '/users.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /users.php Variables : pattern=[VulnHTTPCS] Type : SQLI Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs79 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS80 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'att_id' parameter to '/getfile.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /getfile.php Variables : att_id=[VulnHTTPCS] Type : SQLI Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs80 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS81 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'search_user' parameter to '/search.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /search.php Variables : search_user=[VulnHTTPCS] Type : SQLI Method : POST Solution : References : https://www.httpcs.com/advisory/httpcs81 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS82 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'search_forum' parameter to '/search.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /search.php Variables : search_forum=[VulnHTTPCS] Type : SQLI ethod : POST Solution : References : https://www.httpcs.com/advisory/httpcs82 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS78 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Less Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'full' parameter to '/users.php' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Page : /users.php Variables : full=[VulnHTTPCS] Type : XSS Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs78 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS77 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Less Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'att_id' parameter to '/getfile.php' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Page : /getfile.php Variables : att_id=[VulnHTTPCS] Type : XSS Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs77 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ Twitter : http://twitter.com/HTTPCS_ Advisories : https://www.httpcs.com/advisories Free web vulnerability scanner HTTPCS _______________________________________________
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- [HTTPCS] w-agora 4.2.1 Multiple Vulnerabilities(SQLI, XSS) HTTPCS (Aug 19)