Keystone DLS SQL vuln.
###############################################
Vuln. discovered by : r0t
Date: 31 march 2006
vendor:http://www.indexdata.dk/keystone/
affected versions: 1.5.4 and prior
orginal advisory:
http://pridels.blogspot.com/2006/03/keystone-dls-sql-vuln.html
###############################################
Vuln. description:
Keystone Digital Library Suite contains a flaw that allows a remote sql
injection attacks.Input passed to the "subject_type_id" isn't properly
sanitised before being used in a SQL query. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.
examples:
/?subject_type_id=[SQL]
/search/?number=10&search_type=&subject_type_id=[SQL]
###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/