Ravens PHP Scripts

Invision Power Board *Avatar* Cross-Site Request Forgery
Date: Saturday, October 07, 2006 @ 03:28:35 PDT
Topic: Security


SECUNIA ADVISORY ID: SA22272

VERIFY ADVISORY: http://secunia.com/advisories/22272/

CRITICAL: Less critical

IMPACT: Hijacking, Manipulation of data

WHERE: >From remote

SOFTWARE: Invision Power Board 2.x - http://secunia.com/product/3705/




DESCRIPTION: Rapigator has reported a vulnerability in Invision Power Board, which can be exploited by malicious users to conduct cross-site request forgery attacks. The vulnerability is caused due to the application allowing administrative users to perform certain actions via HTTP requests without performing any validity checks to verify the request. This can e.g. be exploited to execute arbitrary SQL statements when an administrative user with "root admin" privileges views a user's malicious remote avatar image in the Admin CP. The vulnerability is reported in version 2.1.7. Prior versions may also be affected.

SOLUTION:
Apply Security Update for version 2.1.7.
http://forums.invisionpower.com/index.php?showtopic=227937
PROVIDED AND/OR DISCOVERED BY: Rapigator






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2440