Overview
paFileDB works around the default "off" state for the "register_globals" security directive in PHP and then fails to initialize the "query" variable, which can be used to inject arbitrary SQL queries.
Description
"paFileDB is designed to allow webmasters have a database of files for download on their site." This SQL injection vulnerability is one of eight vulnerabilities recently discussed in public forums affecting paFileDB. It works whether magic_quotes is on or not. Proof of concept code and simple examples are in circulation specific to this vulnerability. The following report identifies these vulnerabilities: |
Impact
An attacker could inject arbitrary SQL queries, such as resetting the administrator password. |
Solution
Upgrade to a version 3.1 downloaded after June 15, 2005 of the paFileDB distribution as it contains a fix for this specific vulnerability and a number of other security enhancements for initializing variable before use and sanitising user input. |
Workaround |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
James Bercegay of the GulfTech Security Research Team is credited with discovering this vulnerability.
This document was written by Robert Mead.
Other Information
CVE IDs: | None |
Severity Metric: | 0.95 |
Date Public: | 2005-06-14 |
Date First Published: | 2005-06-21 |
Date Last Updated: | 2005-07-07 20:36 UTC |
Document Revision: | 13 |