Full Disclosure mailing list archives

[HTTPCS] w-agora 4.2.1 Multiple Vulnerabilities(SQLI, XSS)


From: HTTPCS <contact () httpcs com>
Date: Fri, 17 Aug 2012 16:36:03 +0200 (CEST)

HTTPCS Advisory : HTTPCS79
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'pattern' parameter to '/users.php' is not properly sanitised before being
used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /users.php
Variables : pattern=[VulnHTTPCS]
Type : SQLI
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs79
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________
HTTPCS Advisory : HTTPCS80
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'att_id' parameter to '/getfile.php' is not properly sanitised before being
used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /getfile.php
Variables : att_id=[VulnHTTPCS]
Type : SQLI
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs80
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________
HTTPCS Advisory : HTTPCS81
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'search_user' parameter to '/search.php' is not properly sanitised before
being used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /search.php
Variables : search_user=[VulnHTTPCS]
Type : SQLI
Method : POST
Solution :
References : https://www.httpcs.com/advisory/httpcs81
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________
HTTPCS Advisory : HTTPCS82
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'search_forum' parameter to '/search.php' is not properly sanitised before
being used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /search.php
Variables : search_forum=[VulnHTTPCS]
Type : SQLI
ethod : POST
Solution :
References : https://www.httpcs.com/advisory/httpcs82
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________
HTTPCS Advisory : HTTPCS78
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Less Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'full' parameter to '/users.php' is not properly sanitised before
being returned to the user. This can be exploited to execute arbitrary HTML and
script code in a user's browser session in context of an affected site.
Page : /users.php
Variables : full=[VulnHTTPCS]
Type : XSS
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs78
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________
HTTPCS Advisory : HTTPCS77
Product : w-agora
Version : 4.2.1
Date : 2012-08-17
Criticality level : Less Critical
Description : A vulnerability has been discovered in w-agora, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'att_id' parameter to '/getfile.php' is not properly sanitised
before being returned to the user. This can be exploited to execute arbitrary
HTML and script code in a user's browser session in context of an affected site.
Page : /getfile.php
Variables : att_id=[VulnHTTPCS]
Type : XSS
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs77
Credit : HTTPCS [Web Vulnerability Scanner]

_______________________________________________

Twitter : http://twitter.com/HTTPCS_
Advisories : https://www.httpcs.com/advisories
Free web vulnerability scanner HTTPCS
_______________________________________________
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: