Secunia Security Advisory - A vulnerability has been reported in multiple SFS products, which can be exploited by malicious people to conduct SQL injection attacks.
5b0b681467f71a1c6d7c1ac4036e3abeacc3877ee268e9d5a184427ba488d81a
----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
http://secunia.com/binary_analysis/sample_analysis/
----------------------------------------------------------------------
TITLE:
SFS Multiple Products "cat_id" SQL Injection
SECUNIA ADVISORY ID:
SA32558
VERIFY ADVISORY:
http://secunia.com/advisories/32558/
CRITICAL:
Moderately critical
IMPACT:
Manipulation of data, Exposure of sensitive information
WHERE:
>From remote
SOFTWARE:
SFS EZ Links Directory
http://secunia.com/advisories/product/20316/
SFS EZ Adult Directory
http://secunia.com/advisories/product/20320/
SFS EZ Hosting Directory
http://secunia.com/advisories/product/20315/
SFS EZ Home Business Directory
http://secunia.com/advisories/product/20311/
SFS EZ Gaming Directory
http://secunia.com/advisories/product/20314/
SFS EZ Affiliate
http://secunia.com/advisories/product/19603/
DESCRIPTION:
A vulnerability has been reported in multiple SFS products, which can
be exploited by malicious people to conduct SQL injection attacks.
Input passed to the "cat_id" parameter in directory.php (when "ax" is
set to "list") is not properly sanitised before being used in SQL
queries. This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code.
This vulnerability is reported in the following SFS products:
- SFS EZ Links Directory
- SFS EZ Adult Directory
- SFS EZ Hosting Directory
- SFS EZ Home Business Directory
- SFS EZ Gaming Directory
- SFS EZ Affiliate
SOLUTION:
Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY:
BeyazKurt and Darckc0de
ORIGINAL ADVISORY:
http://milw0rm.com/exploits/6911
http://milw0rm.com/exploits/6908
http://milw0rm.com/exploits/6907
http://milw0rm.com/exploits/6906
http://milw0rm.com/exploits/6905
http://milw0rm.com/exploits/6895
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------