SQL injection vulnerability in submit.php in PHP-Fusion 6.01.14 and 6.00.307, when magic_quotes_gpc is disabled and the database table prefix is known, allows remote authenticated users to execute arbitrary SQL commands via the submit_info[] parameter in a link submission action. NOTE: it was later reported that 7.00.2 is also affected.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://secunia.com/advisories/33295 | third party advisory vendor advisory |
http://www.php-fusion.co.uk/news.php | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41914 | vdb entry |
https://www.exploit-db.com/exploits/5470 | exploit |
http://www.vupen.com/english/advisories/2008/1318/references | vdb entry |
https://www.exploit-db.com/exploits/7576 | exploit |
http://secunia.com/advisories/29930 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/28855 | patch vdb entry exploit |
http://osvdb.org/51052 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47610 | vdb entry |