Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:20788
HistoryNov 01, 2008 - 12:00 a.m.

Secunia Research: Interact SQL Injection and Cross-Site Request Forgery

2008-11-0100:00:00
vulners.com
26

======================================================================

                 Secunia Research 31/10/2008

  - Interact SQL Injection and Cross-Site Request Forgery -

======================================================================
Table of Contents

Affected Software…1
Severity…2
Vendor's Description of Software…3
Description of Vulnerability…4
Solution…5
Time Table…6
Credits…7
References…8
About Secunia…9
Verification…10

======================================================================
1) Affected Software

  • Interact 2.4.1

NOTE: Other versions may also be affected.

======================================================================
2) Severity

Rating: Moderately Critical
Impact: SQL Injection
Cross-Site Request Forgery
Where: Remote

======================================================================
3) Vendor's Description of Software

"A platform for the delivery and support of online learning. It
differs from many other elearning platforms in that its aim is to
concentrate on the social/interactive aspects of teaching and learning
rather than the delivery of content to students."

Product Link:
http://sourceforge.net/projects/cce-interact

======================================================================
4) Description of Vulnerability

Secunia Research has discovered two vulnerabilities in Interact, which
can be exploited by malicious people to conduct cross-site request
forgery and SQL injection attacks.

1) Input passed to the "email_user_key" parameter in
spaces/emailuser.php is not properly sanitised before being used in
SQL queries. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.

Successful exploitation of this vulnerability allows e.g. retrieval of
super administrator usernames and password hashes, but requires
knowledge of the database table prefix.

2) The application allows users to perform certain actions via HTTP
requests without performing any validity checks to verify the request.
This can be exploited to e.g. add new super administrator users by
enticing a logged-in super administrator to visit a malicious web
page.

======================================================================
5) Solution

Apply the vendor's official patch for vulnerability #1:
http://sourceforge.net/tracker/index.php?func=detail&aid=2208205&
group_id=69681&atid=525406

Do not browse untrusted websites while logged in.

======================================================================
6) Time Table

24/10/2008 - Vendor notified.
28/10/2008 - Vendor response.
30/10/2008 - The vendor publishes a patch for vulnerability #1 and
states that he will wait with the CSRF fixes and won't
fix the product's CSRF issues completely.
31/10/2008 - Public disclosure.

======================================================================
7) Credits

Discovered by Secunia Research.

======================================================================
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
CVE-2008-3867 (SQL injection) and CVE-2008-3868 (CSRF) for the
vulnerabilities.

======================================================================
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

======================================================================
10) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2008-44/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================

Related for SECURITYVULNS:DOC:20788