Multiple SQL injection vulnerabilities in TorrentTrader Classic 1.09 allow remote authenticated users to execute arbitrary SQL commands via (1) the origmsg parameter to account-inbox.php; the categ parameter to (2) delreq.php and (3) admin-delreq.php; (4) the choice parameter to index.php; (5) the id parameter to modrules.php in an edited (aka edit) action; the (6) user, (7) torrent, (8) forumid, and (9) forumpost parameters to report.php; (10) the delmp parameter to take-deletepm.php; (11) the delreport parameter to takedelreport.php; (12) the delreq parameter to takedelreq.php; (13) the clases parameter to takestaffmess.php; and (14) the warndisable parameter to takewarndisable.php; and allow remote attackers to execute arbitrary SQL commands via (15) the wherecatin parameter to browse.php, (16) the limit parameter to today.php, and (17) the where parameter to torrents-details.php.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/51142 | vdb entry |
http://secunia.com/advisories/35456 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51181 | vdb entry |
http://www.securityfocus.com/bid/35369 | vdb entry exploit |
https://www.exploit-db.com/exploits/8958 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51179 | vdb entry |
http://www.securityfocus.com/archive/1/504294/100/0/threaded | mailing list |
http://www.waraxe.us/advisory-74.html | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51178 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51180 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51143 | vdb entry |