---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: NEXTWEB (i)Site Multiple Vulnerabilities SECUNIA ADVISORY ID: SA15560 VERIFY ADVISORY: http://secunia.com/advisories/15560/ CRITICAL: Moderately critical IMPACT: Manipulation of data, Exposure of sensitive information, DoS WHERE: >From remote SOFTWARE: NEXTWEB (i)Site http://secunia.com/product/5194/ DESCRIPTION: Trash-80 has reported some vulnerabilities in NEXTWEB (i)Site, which can be exploited by malicious people to cause a DoS (Denial of Service), conduct SQL injection attacks and disclose sensitive information. 1) Input passed to the "username" and "password" fields in "login.asp" isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 2) User credentials are stored in the the "databases/Users.mdb" database file inside the web root, which can be exploited to disclose usernames and passwords. 3) An error in the handling of certain malformed requests can be exploited to cause a vulnerable service to become temporary unavailable. Example: http://[host]/isite/page/*.asp?mu=&cmu=' SOLUTION: Edit the source code to ensure that input is properly sanitised and verified. Move the "Users.mdb" database file out of the web root. PROVIDED AND/OR DISCOVERED BY: Trash-80, Zone-H Security Team ORIGINAL ADVISORY: http://www.zone-h.org/advisories/read/id=7605 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------