[Message Precedent sur la mailing
][Message Suivant sur la mailing
][Precedent dans le fil
][Prochain dans le fil
][Index par Date
][Index par fil
[SA23486] PHP-Update Multiple Vulnerabilities
Secunia is proud to announce the availability of the Secunia Software
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
PHP-Update Multiple Vulnerabilities
SECUNIA ADVISORY ID:
Security Bypass, Manipulation of data, System access
Some vulnerabilities have been reported in PHP-Update, which can be
exploited by malicious people to bypass certain security restrictions
and conduct SQL injection attacks and by malicious users to compromise
a vulnerable system.
1) An insecure authentication method in admin/uploads.php can be
exploited to bypass authentication and upload files by passing the
value "1" to the "rights" parameter.
2) The admin/uploads.php script fails to validate the extension of an
uploaded file, which can be exploited to upload files with arbitrary
extensions (e.g. ".php") and execute arbitrary PHP code on the
Successful exploitation requires valid user credentials, but can be
combined with #1.
3) Input passed to the "newname" parameter in code/guestadd.php is
not properly sanitised before being used in SQL queries. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation may disclose the administrator username and
password, but requires that the system is running MySQL 4.1 or
Vulnerabilities #1 and #2 are confirmed in version 2.7 MySQL edition
but not in version 2.7 flat file edition. Vulnerability #3 is
reported in version 2.7 MySQL edition.
Edit the source code to ensure that input is properly sanitised and
that authentication is done correctly.
Use another product.
PROVIDED AND/OR DISCOVERED BY:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
Definitions: (Criticality, Where etc.)
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
|Mini-Tagwall des articles publiés sur SecuObs : || |
| || |
| | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre
|Mini-Tagwall de l'annuaire video : || |
| || |
| | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio
|Mini-Tagwall des articles de la revue de presse : || |
| || |
| |security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité
|Mini-Tagwall des Tweets de la revue Twitter : || |
| || |