Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12049
HistoryMar 31, 2006 - 12:00 a.m.

Keystone DLS SQL vuln.

2006-03-3100:00:00
vulners.com
6

Keystone DLS SQL vuln.

###############################################
Vuln. discovered by : r0t
Date: 31 march 2006
vendor:http://www.indexdata.dk/keystone/
affected versions: 1.5.4 and prior
orginal advisory:
http://pridels.blogspot.com/2006/03/keystone-dls-sql-vuln.html
###############################################

Vuln. description:

Keystone Digital Library Suite contains a flaw that allows a remote sql
injection attacks.Input passed to the "subject_type_id" isn't properly
sanitised before being used in a SQL query. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

examples:

/?subject_type_id=[SQL]
/search/?number=10&search_type=&subject_type_id=[SQL]

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/