Insomnia Security Vulnerability Advisory: ISVA-100730.1
Name: EasyManage CMS Multiple SQL injection Vulnerabilities
Released: 30 July 2010
Vendor Link:
http://www.face.co.nz/easymanage
Affected Products:
Easy Manage CMS
Original Advisory:
http://www.insomniasec.com/advisories/ISVA-100730.1.htm
Researcher:
James Burton, Insomnia Security
http://www.insomniasec.com
Description
EasyManage Content Management System is a modular system designed
by New Zealand company, Face Limited.
It contains two modules which may be easily exploited to carry out
SQL injection attacks.
Details
The vulnerable modules are cms_show_image.php and cms_show_download.php.
Both fail to filter the id paramater before using it in an SQL query.
The following error message is evident when id=1' is passed to
cms_show_image.php:
"Image select failed : You have an error in your SQL syntax;
check the manual that corresponds to your MySQL server version for the
right syntax to use near '\'' at line 1"
This generic form of SQL injection can be used to mine data from the
database, and under certain configurations allow for unauthorised
access to the CMS or underlying server.
Solution
Face Limited were advised of this issue late June, and have released a
patch to its hosted customers. Independant customers can obtain a patch
by contacting the vendor.
Legals
The information is provided for research and educational purposes
only. Insomnia Security accepts no liability in any form whatsoever
for any direct or indirect damages associated with the use of this
information.
Insomnia Security Vulnerability Advisory: ISVA-100730.1