<<< Date Index >>>     <<< Thread Index >>>

Secunia Research: CMS Mundo SQL Injection and File Upload Vulnerabilities



======================================================================

                     Secunia Research 14/06/2006

     - CMS Mundo SQL Injection and File Upload Vulnerabilities -

======================================================================
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerabilities.......................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

======================================================================
1) Affected Software

CMS Mundo 1.0 build 007

Prior versions may also be affected.

Product Link:
http://www.hotwebscripts.com/index.php?mod=webshop&function=
showDetails&id=76

======================================================================
2) Severity

Rating: Highly critical
Impact: System access, manipulation of data
Where:  From remote

======================================================================
3) Description of Vulnerabilities

Secunia Research has discovered two vulnerabilities in CMS Mundo, 
which can be exploited by malicious people to conduct SQL injection 
attacks and compromise a vulnerable system.

1) Input passed to the "username" parameter in "controlpanel/" 
during login isn't properly sanitised before being used in a 
SQL query. This can be exploited to manipulate SQL queries by 
injecting arbitrary SQL code.

This can further be exploited to bypass the authentication process 
and access the administration section (by e.g. providing 
"admin ' /*" as the username together with an empty password).

Successful exploitation requires that "magic_quotes_gpc" is disabled.

2) An input validation error in the image upload handling in the 
image gallery can be exploited to upload arbitrary PHP scripts to a 
predictable location inside the web root.

Successful exploitation requires access to the administration section.

A combination of vulnerabilities #1 and #2 can be exploited by a 
malicious person to execute arbitrary PHP code on a vulnerable system.

The vulnerabilities have been confirmed in version 1.0 build 007. 
Prior versions may also be affected.

======================================================================
4) Solution

Update to version 1.0 build 008.

======================================================================
5) Time Table

30/05/2006 - Initial vendor notification.
30/05/2006 - Vendor confirms vulnerabilities.
14/06/2006 - Public disclosure.

======================================================================
6) Credits

Discovered by Andreas Sandblad, Secunia Research.

======================================================================
7) References

The Common Vulnerabilities and Exposures (CVE) project has assigned 
CVE-2006-2911 (SQL injection) and 
CVE-2006-2931 (arbitrary file upload) for the vulnerabilities.

======================================================================
8) About Secunia

Secunia collects, validates, assesses, and writes advisories regarding
all the latest software vulnerabilities disclosed to the public. These
advisories are gathered in a publicly available database at the
Secunia website:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all
relevant vulnerability information to their specific system
configuration.

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

======================================================================
9) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-43/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================