|
=====================================================================
Secunia Research 14/06/2006
- CMS Mundo SQL Injection and File Upload Vulnerabilities -
=====================================================================Table of Contents
Affected Software....................................................1
Severity.............................................................2
Description of Vulnerabilities.......................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9
=====================================================================1) Affected Software
CMS Mundo 1.0 build 007
Prior versions may also be affected.
Product Link:
http://www.hotwebscripts.com/index.php?mod=webshop&functionshowDetails&id=76
=====================================================================2) Severity
Rating: Highly critical
Impact: System access, manipulation of data
Where: From remote
=====================================================================3) Description of Vulnerabilities
Secunia Research has discovered two vulnerabilities in CMS Mundo,
which can be exploited by malicious people to conduct SQL injection
attacks and compromise a vulnerable system.
1) Input passed to the "username" parameter in "controlpanel/"
during login isn't properly sanitised before being used in a
SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
This can further be exploited to bypass the authentication process
and access the administration section (by e.g. providing
"admin ' /*" as the username together with an empty password).
Successful exploitation requires that "magic_quotes_gpc" is disabled.
2) An input validation error in the image upload handling in the
image gallery can be exploited to upload arbitrary PHP scripts to a
predictable location inside the web root.
Successful exploitation requires access to the administration section.
A combination of vulnerabilities #1 and #2 can be exploited by a
malicious person to execute arbitrary PHP code on a vulnerable system.
The vulnerabilities have been confirmed in version 1.0 build 007.
Prior versions may also be affected.
=====================================================================4) Solution
Update to version 1.0 build 008.
=====================================================================5) Time Table
30/05/2006 - Initial vendor notification.
30/05/2006 - Vendor confirms vulnerabilities.
14/06/2006 - Public disclosure.
=====================================================================6) Credits
Discovered by Andreas Sandblad, Secunia Research.
=====================================================================7) References
The Common Vulnerabilities and Exposures (CVE) project has assigned
CVE-2006-2911 (SQL injection) and
CVE-2006-2931 (arbitrary file upload) for the vulnerabilities.
=====================================================================8) About Secunia
Secunia collects, validates, assesses, and writes advisories regarding
all the latest software vulnerabilities disclosed to the public. These
advisories are gathered in a publicly available database at the
Secunia website:
http://secunia.com/
Secunia offers services to our customers enabling them to receive all
relevant vulnerability information to their specific system
configuration.
Secunia offers a FREE mailing list called Secunia Security Advisories:
http://secunia.com/secunia_security_advisories/
=====================================================================9) Verification
Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-43/advisory/
Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/
=====================================================================