Social Engine 2.7 CRLF Injection + SQL injection

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1052385 漏洞类型
发布时间 2008-11-21 更新时间 2008-11-21
CVE编号 CVE-2008-6120
漏洞平台 N/A CVSS评分 N/A
 [HACKATTACK Advisory 2008-11-20]Social Engine 2.7 CRLF Injection + SQL injection

Product: Social Engine
Security-Risk: moderate
Remote-Exploit: yes
Vendor-Status: informed
Advisory-Status: published

Discovered by: David Vieira-Kurz of HACKATTACK IT SECURITY GmbH ||

Affected Products:
Social Engine 2.7 and prior

Original Advisory:
SocialEngine is a PHP-based social network platform that lets you create a social network on your website.

More Details
1. SQL Injection:
Input passed to the POST variable "comment_secure" parameter in "profile_comments.php" is not properly sanitised before being used in a SQL query.

2. Cookie_Manipulation:
The cookie variable "PHPSESSID" is not properly sanitized before being used.
This can be exploited by injecting arbitrary custom headers using a carriage return linefeed injection. 

Edit the source code to ensure that input is properly sanitised.
You should work with "htmlspecialchars()" or "htmlentities()" php-function to ensure that html tags
are not going to be executed. You should also work with the "mysql_real_escape_string()" php-function to ensure that sql statements
can't be delivered over the "get" variables. It's also possible to turn on magic_quotes, depending on how you handle the quotes inside
of your script to make sure magic_quotes doesn't double escape the quotes. 

# clean = array();
# $html = array();
# $html['username'] = htmlentities($clean['username'],ENT_QUOTES,UTF-8'); 

HACKATTACK IT SECURITY GmbH is a Penetrationtest and security Auditing company located in Austria and Germany.

Hotline Germany +49 (0)800 20 60 900
Hotline Austria +43 (0)06223 20 6210
More Information about HACKATTACK at ||