Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12327
HistoryApr 20, 2006 - 12:00 a.m.

Green Minute SQL inj. vuln.

2006-04-2000:00:00
vulners.com
20

Green Minute SQL inj. vuln.

###############################################
Vuln. discovered by : r0t
Date: 20 april 2006
vendorlink:http://hoito.org/en/products/
affected versions:v1.0 and previous
orginal advisory:
http://pridels.blogspot.com/2006/04/green-minute-sql-inj-vuln.html
###############################################

Vuln. Description:

Green Minute contains a flaw that allows a remote sql injection
attacks.Input passed to the "huserid","pituus","date" parameters in "
userscript.php" isn't properly sanitised before being used in a SQL query.
This can be exploited to manipulate SQL queries by injecting arbitrary SQL
code.

examples:

/userscript.php?command=select&date=
&phase=2&huserid=[SQL]

/userscript.php?command=select&phase=
2&date=&pituus=[SQL]

/userscript.php?command=select&phase=
2&date=[SQL]

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/