Ravens PHP Scripts

Photo Galerie Script *id* SQL Injection Vulnerability
Date: Monday, February 05, 2007 @ 10:19:05 PST
Topic: Security


SECUNIA ADVISORY ID: SA24029

VERIFY ADVISORY: http://secunia.com/advisories/24029/

CRITICAL: Moderately critical

IMPACT: Manipulation of data

SOFTWARE: Photo Galerie Script 1.x - http://secunia.com/product/13414/

DESCRIPTION: ajann has discovered a vulnerability in Photo Galerie Script, which can be exploited by malicious people to conduct SQL injection attacks.


Input passed to the "id" parameter in view.php is not properly sanitised before being used in an SQL query. This can be exploited to manipulate SQL queries, by injecting arbitrary SQL code. The vulnerability is confirmed in Photo Galerie Script Standard version 1.1.1. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY: ajann

ORIGINAL ADVISORY: http://milw0rm.com/exploits/3261






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2734