Ravens PHP Scripts

ShoutPro *shout* PHP Code Injection Vulnerability
Date: Wednesday, April 18, 2007 @ 10:40:00 CEST
Topic: Security


SECUNIA ADVISORY ID: SA24939

VERIFY ADVISORY: http://secunia.com/advisories/24939/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: ShoutPro 1.x - http://secunia.com/product/13977/

DESCRIPTION: Gammarays has discovered a vulnerability in ShoutPro, which can be exploited by malicious people to compromise a vulnerable system.



Input passed to the "shout" parameter in shoutbox.php is not properly sanitised before being stored in shouts.php. This can be exploited to inject and execute arbitrary PHP code. The vulnerability is confirmed in version 1.5.2. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY: Gammarays






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2866