4 images 1.7.9 multiple defects and repair

Source: Internet
Author: User

======================================

Vulnerability ID: HTB22950

Reference: html "> http://www.htbridge.ch/advisory/ SQL _injection_in_4images.html

Product: 4 images

Vendor: http://www.4homepages.de/(http://www.4homepages.de /)

Vulnerable Version: 1.7.9

Vendor Notification: 07 127l 2011

Vulnerability Type: SQL Injection

Status: Fixed by Vendor

Risk level: Medium

Credit: High-Tech Bridge SA Security Research Lab (http://www.htbridge.ch/advisory)

Vulnerability Details:

The vulnerability exists due to failure in the "/admin/categories. php" script to properly sanitize user-supplied input.

Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit varous vulnerabilities in the underlying SQL database.

The following PoC is available:

POST/admin/categories. php HTTP/1.1

Content-Type: application/x-www-form-urlencoded

Content-Length: 263

_ Csrf = 53c2e96a96fcba6dc1d9626c846f665b & action = savecat & cat_name = 1 & cat_description = 1 & cat_parent_id

= 0 & cat_order = 0 & auth_viewcat = SQL _CODE_HERE & auth_viewimage = 0 & auth_download = 2 & auth_upload = 2

& Auth_directupload = 9 & auth_vote = 0 & auth_sendpostcard = 0 & auth_readcomment = 0 & auth_postcomment = 2

Solution: Upgrade to the most recent version

======================================

Vulnerability ID: HTB22949

Reference: http://www.htbridge.ch/advisory/multiple_path_disclousure_in_4images.html

Product: 4 images

Vendor: http://www.4homepages.de/(http://www.4homepages.de /)

Vulnerable Version: 1.7.9

Vendor Notification: 07 127l 2011

Vulnerability Type: Path disclosure

Status: Fixed by Vendor

Risk level: Low

Credit: High-Tech Bridge SA Security Research Lab (http://www.htbridge.ch/advisory)

Vulnerability Details:

The vulnerability exists due to failure in the "endpoints des/page_header.php" script, its possible to generate an error that will reveal the full path of the script.

A remote user can determine the full path to the web root directory and other potentially sensitive information.

The following PoC is available:

GET/index. php? Action = rateimage & amp; id = 1 HTTP/1.1

Cookie: 4images_rated [] = 1

The vulnerability exists due to failure in the "global. php" script, its possible to generate an error that will reveal the full path of the script.

The following PoC is available:

Http://www.bkjia.com/index.php? Action [] = 1

Solution: Upgrade to the most recent version

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.